Feb 12 19:14:58.061640 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:14:58.061657 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:14:58.061665 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 12 19:14:58.061672 kernel: printk: bootconsole [pl11] enabled Feb 12 19:14:58.061677 kernel: efi: EFI v2.70 by EDK II Feb 12 19:14:58.061682 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 12 19:14:58.061688 kernel: random: crng init done Feb 12 19:14:58.061694 kernel: ACPI: Early table checksum verification disabled Feb 12 19:14:58.061699 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 12 19:14:58.061704 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:58.061710 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:58.061716 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:14:58.061721 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:58.061727 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:58.061733 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:58.061739 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:58.061745 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:58.061752 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:58.061757 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 12 19:14:58.061763 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:58.061769 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 12 19:14:58.061774 kernel: NUMA: Failed to initialise from firmware Feb 12 19:14:58.061780 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:14:58.061798 kernel: NUMA: NODE_DATA [mem 0x1bf7f1900-0x1bf7f6fff] Feb 12 19:14:58.061805 kernel: Zone ranges: Feb 12 19:14:58.061811 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 12 19:14:58.061816 kernel: DMA32 empty Feb 12 19:14:58.061823 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:14:58.061829 kernel: Movable zone start for each node Feb 12 19:14:58.061835 kernel: Early memory node ranges Feb 12 19:14:58.061840 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 12 19:14:58.061846 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 12 19:14:58.061852 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 12 19:14:58.061857 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 12 19:14:58.061863 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 12 19:14:58.061868 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 12 19:14:58.061874 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 12 19:14:58.061879 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 12 19:14:58.061885 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:14:58.061892 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:14:58.061900 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 12 19:14:58.061906 kernel: psci: probing for conduit method from ACPI. Feb 12 19:14:58.061912 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:14:58.061918 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:14:58.061925 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 12 19:14:58.061931 kernel: psci: SMC Calling Convention v1.4 Feb 12 19:14:58.061937 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 12 19:14:58.061943 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 12 19:14:58.061949 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:14:58.061955 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:14:58.061961 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 12 19:14:58.061967 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:14:58.061973 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:14:58.061979 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:14:58.061985 kernel: CPU features: detected: Spectre-BHB Feb 12 19:14:58.061991 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:14:58.061998 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:14:58.062004 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:14:58.062010 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 12 19:14:58.062016 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 12 19:14:58.062022 kernel: Policy zone: Normal Feb 12 19:14:58.062030 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:14:58.062036 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:14:58.062042 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:14:58.062048 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:14:58.062054 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:14:58.062062 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 12 19:14:58.062068 kernel: Memory: 3991932K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202228K reserved, 0K cma-reserved) Feb 12 19:14:58.062074 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:14:58.062080 kernel: trace event string verifier disabled Feb 12 19:14:58.062086 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:14:58.062100 kernel: rcu: RCU event tracing is enabled. Feb 12 19:14:58.062106 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:14:58.062112 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:14:58.062118 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:14:58.062124 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:14:58.062130 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:14:58.062138 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:14:58.062143 kernel: GICv3: 960 SPIs implemented Feb 12 19:14:58.062149 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:14:58.063375 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:14:58.063386 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:14:58.063393 kernel: GICv3: 16 PPIs implemented Feb 12 19:14:58.063399 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 12 19:14:58.063406 kernel: ITS: No ITS available, not enabling LPIs Feb 12 19:14:58.063412 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:14:58.063418 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:14:58.063425 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:14:58.063431 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:14:58.063442 kernel: Console: colour dummy device 80x25 Feb 12 19:14:58.063448 kernel: printk: console [tty1] enabled Feb 12 19:14:58.063455 kernel: ACPI: Core revision 20210730 Feb 12 19:14:58.063461 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:14:58.063467 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:14:58.063473 kernel: LSM: Security Framework initializing Feb 12 19:14:58.063480 kernel: SELinux: Initializing. Feb 12 19:14:58.063486 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:14:58.063492 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:14:58.063500 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 12 19:14:58.063506 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 12 19:14:58.063513 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:14:58.063519 kernel: Remapping and enabling EFI services. Feb 12 19:14:58.063525 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:14:58.063532 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:14:58.063538 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 12 19:14:58.063544 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:14:58.063550 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:14:58.063558 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:14:58.063564 kernel: SMP: Total of 2 processors activated. Feb 12 19:14:58.063570 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:14:58.063577 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 12 19:14:58.063583 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:14:58.063589 kernel: CPU features: detected: CRC32 instructions Feb 12 19:14:58.063595 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:14:58.063602 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:14:58.063608 kernel: CPU features: detected: Privileged Access Never Feb 12 19:14:58.063615 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:14:58.063622 kernel: alternatives: patching kernel code Feb 12 19:14:58.063632 kernel: devtmpfs: initialized Feb 12 19:14:58.063640 kernel: KASLR enabled Feb 12 19:14:58.063647 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:14:58.063654 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:14:58.063660 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:14:58.063667 kernel: SMBIOS 3.1.0 present. Feb 12 19:14:58.063673 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:14:58.063680 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:14:58.063688 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:14:58.063695 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:14:58.063701 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:14:58.063708 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:14:58.063714 kernel: audit: type=2000 audit(0.091:1): state=initialized audit_enabled=0 res=1 Feb 12 19:14:58.063721 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:14:58.063728 kernel: cpuidle: using governor menu Feb 12 19:14:58.063736 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:14:58.063742 kernel: ASID allocator initialised with 32768 entries Feb 12 19:14:58.063749 kernel: ACPI: bus type PCI registered Feb 12 19:14:58.063755 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:14:58.063762 kernel: Serial: AMBA PL011 UART driver Feb 12 19:14:58.063768 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:14:58.063775 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:14:58.063782 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:14:58.063788 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:14:58.063796 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:14:58.063802 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:14:58.063809 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:14:58.063815 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:14:58.063822 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:14:58.063828 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:14:58.063835 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:14:58.063841 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:14:58.063848 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:14:58.063856 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:14:58.063863 kernel: ACPI: Interpreter enabled Feb 12 19:14:58.063869 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:14:58.063876 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:14:58.063883 kernel: printk: console [ttyAMA0] enabled Feb 12 19:14:58.063889 kernel: printk: bootconsole [pl11] disabled Feb 12 19:14:58.063896 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 12 19:14:58.063902 kernel: iommu: Default domain type: Translated Feb 12 19:14:58.063909 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:14:58.063916 kernel: vgaarb: loaded Feb 12 19:14:58.063923 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:14:58.063929 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:14:58.063936 kernel: PTP clock support registered Feb 12 19:14:58.063942 kernel: Registered efivars operations Feb 12 19:14:58.063949 kernel: No ACPI PMU IRQ for CPU0 Feb 12 19:14:58.063955 kernel: No ACPI PMU IRQ for CPU1 Feb 12 19:14:58.063962 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:14:58.063968 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:14:58.063976 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:14:58.063982 kernel: pnp: PnP ACPI init Feb 12 19:14:58.063989 kernel: pnp: PnP ACPI: found 0 devices Feb 12 19:14:58.063995 kernel: NET: Registered PF_INET protocol family Feb 12 19:14:58.064002 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:14:58.064008 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:14:58.064015 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:14:58.064022 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:14:58.064028 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:14:58.064036 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:14:58.064043 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:14:58.064049 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:14:58.064056 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:14:58.064062 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:14:58.064069 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 12 19:14:58.064075 kernel: kvm [1]: HYP mode not available Feb 12 19:14:58.064082 kernel: Initialise system trusted keyrings Feb 12 19:14:58.064089 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:14:58.064096 kernel: Key type asymmetric registered Feb 12 19:14:58.064103 kernel: Asymmetric key parser 'x509' registered Feb 12 19:14:58.064109 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:14:58.064116 kernel: io scheduler mq-deadline registered Feb 12 19:14:58.064122 kernel: io scheduler kyber registered Feb 12 19:14:58.064129 kernel: io scheduler bfq registered Feb 12 19:14:58.064136 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:14:58.064142 kernel: thunder_xcv, ver 1.0 Feb 12 19:14:58.064148 kernel: thunder_bgx, ver 1.0 Feb 12 19:14:58.064165 kernel: nicpf, ver 1.0 Feb 12 19:14:58.064172 kernel: nicvf, ver 1.0 Feb 12 19:14:58.064286 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:14:58.064348 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:14:57 UTC (1707765297) Feb 12 19:14:58.064357 kernel: efifb: probing for efifb Feb 12 19:14:58.064363 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:14:58.064370 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:14:58.064377 kernel: efifb: scrolling: redraw Feb 12 19:14:58.064386 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:14:58.064393 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:14:58.064399 kernel: fb0: EFI VGA frame buffer device Feb 12 19:14:58.064406 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 12 19:14:58.064412 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:14:58.064419 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:14:58.064425 kernel: Segment Routing with IPv6 Feb 12 19:14:58.064432 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:14:58.064439 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:14:58.064446 kernel: Key type dns_resolver registered Feb 12 19:14:58.064453 kernel: registered taskstats version 1 Feb 12 19:14:58.064459 kernel: Loading compiled-in X.509 certificates Feb 12 19:14:58.064466 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:14:58.064472 kernel: Key type .fscrypt registered Feb 12 19:14:58.064479 kernel: Key type fscrypt-provisioning registered Feb 12 19:14:58.064485 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:14:58.064492 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:14:58.064499 kernel: ima: No architecture policies found Feb 12 19:14:58.064506 kernel: Freeing unused kernel memory: 34688K Feb 12 19:14:58.064513 kernel: Run /init as init process Feb 12 19:14:58.064519 kernel: with arguments: Feb 12 19:14:58.064526 kernel: /init Feb 12 19:14:58.064532 kernel: with environment: Feb 12 19:14:58.064538 kernel: HOME=/ Feb 12 19:14:58.064545 kernel: TERM=linux Feb 12 19:14:58.064551 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:14:58.064559 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:14:58.064569 systemd[1]: Detected virtualization microsoft. Feb 12 19:14:58.064577 systemd[1]: Detected architecture arm64. Feb 12 19:14:58.064584 systemd[1]: Running in initrd. Feb 12 19:14:58.064590 systemd[1]: No hostname configured, using default hostname. Feb 12 19:14:58.064597 systemd[1]: Hostname set to . Feb 12 19:14:58.064604 systemd[1]: Initializing machine ID from random generator. Feb 12 19:14:58.064611 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:14:58.064619 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:14:58.064626 systemd[1]: Reached target cryptsetup.target. Feb 12 19:14:58.064633 systemd[1]: Reached target paths.target. Feb 12 19:14:58.064640 systemd[1]: Reached target slices.target. Feb 12 19:14:58.064647 systemd[1]: Reached target swap.target. Feb 12 19:14:58.064654 systemd[1]: Reached target timers.target. Feb 12 19:14:58.064661 systemd[1]: Listening on iscsid.socket. Feb 12 19:14:58.064668 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:14:58.064677 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:14:58.064684 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:14:58.064691 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:14:58.064698 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:14:58.064705 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:14:58.064713 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:14:58.064719 systemd[1]: Reached target sockets.target. Feb 12 19:14:58.064726 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:14:58.064733 systemd[1]: Finished network-cleanup.service. Feb 12 19:14:58.064742 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:14:58.064748 systemd[1]: Starting systemd-journald.service... Feb 12 19:14:58.064756 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:14:58.064763 systemd[1]: Starting systemd-resolved.service... Feb 12 19:14:58.064773 systemd-journald[276]: Journal started Feb 12 19:14:58.064810 systemd-journald[276]: Runtime Journal (/run/log/journal/405630424ab6440aa22f9815446de80e) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:14:58.062223 systemd-modules-load[277]: Inserted module 'overlay' Feb 12 19:14:58.095172 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:14:58.095222 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:14:58.100852 kernel: Bridge firewalling registered Feb 12 19:14:58.100953 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 12 19:14:58.121175 kernel: SCSI subsystem initialized Feb 12 19:14:58.140722 systemd[1]: Started systemd-journald.service. Feb 12 19:14:58.140772 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:14:58.132124 systemd-resolved[278]: Positive Trust Anchors: Feb 12 19:14:58.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.132142 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:14:58.249294 kernel: audit: type=1130 audit(1707765298.146:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.249319 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:14:58.249327 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:14:58.249336 kernel: audit: type=1130 audit(1707765298.187:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.249345 kernel: audit: type=1130 audit(1707765298.218:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.187000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.218000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.132220 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:14:58.134302 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 12 19:14:58.287000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.146387 systemd[1]: Started systemd-resolved.service. Feb 12 19:14:58.180455 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 12 19:14:58.385562 kernel: audit: type=1130 audit(1707765298.287:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.385584 kernel: audit: type=1130 audit(1707765298.293:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.385594 kernel: audit: type=1130 audit(1707765298.325:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.188121 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:14:58.219102 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:14:58.288253 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:14:58.293702 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:14:58.326119 systemd[1]: Reached target nss-lookup.target. Feb 12 19:14:58.438000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.366462 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:14:58.397481 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:14:58.500620 kernel: audit: type=1130 audit(1707765298.438:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.500643 kernel: audit: type=1130 audit(1707765298.476:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.476000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.415242 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:14:58.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.433306 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:14:58.545423 kernel: audit: type=1130 audit(1707765298.506:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.465248 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:14:58.476707 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:14:58.557312 dracut-cmdline[299]: dracut-dracut-053 Feb 12 19:14:58.557312 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=t Feb 12 19:14:58.557312 dracut-cmdline[299]: tyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:14:58.531865 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:14:58.624169 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:14:58.640180 kernel: iscsi: registered transport (tcp) Feb 12 19:14:58.659682 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:14:58.659696 kernel: QLogic iSCSI HBA Driver Feb 12 19:14:58.689130 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:14:58.695000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:58.696145 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:14:58.754173 kernel: raid6: neonx8 gen() 13826 MB/s Feb 12 19:14:58.774175 kernel: raid6: neonx8 xor() 10833 MB/s Feb 12 19:14:58.796166 kernel: raid6: neonx4 gen() 13565 MB/s Feb 12 19:14:58.818165 kernel: raid6: neonx4 xor() 11162 MB/s Feb 12 19:14:58.839165 kernel: raid6: neonx2 gen() 13117 MB/s Feb 12 19:14:58.860164 kernel: raid6: neonx2 xor() 10274 MB/s Feb 12 19:14:58.882164 kernel: raid6: neonx1 gen() 10492 MB/s Feb 12 19:14:58.903164 kernel: raid6: neonx1 xor() 8802 MB/s Feb 12 19:14:58.924164 kernel: raid6: int64x8 gen() 6298 MB/s Feb 12 19:14:58.946164 kernel: raid6: int64x8 xor() 3549 MB/s Feb 12 19:14:58.967163 kernel: raid6: int64x4 gen() 7229 MB/s Feb 12 19:14:58.988163 kernel: raid6: int64x4 xor() 3855 MB/s Feb 12 19:14:59.011166 kernel: raid6: int64x2 gen() 6145 MB/s Feb 12 19:14:59.032163 kernel: raid6: int64x2 xor() 3323 MB/s Feb 12 19:14:59.053164 kernel: raid6: int64x1 gen() 5046 MB/s Feb 12 19:14:59.080833 kernel: raid6: int64x1 xor() 2648 MB/s Feb 12 19:14:59.080843 kernel: raid6: using algorithm neonx8 gen() 13826 MB/s Feb 12 19:14:59.080851 kernel: raid6: .... xor() 10833 MB/s, rmw enabled Feb 12 19:14:59.085926 kernel: raid6: using neon recovery algorithm Feb 12 19:14:59.104167 kernel: xor: measuring software checksum speed Feb 12 19:14:59.109163 kernel: 8regs : 17286 MB/sec Feb 12 19:14:59.119687 kernel: 32regs : 20760 MB/sec Feb 12 19:14:59.119700 kernel: arm64_neon : 27816 MB/sec Feb 12 19:14:59.119708 kernel: xor: using function: arm64_neon (27816 MB/sec) Feb 12 19:14:59.181170 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:14:59.189831 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:14:59.194000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.198000 audit: BPF prog-id=7 op=LOAD Feb 12 19:14:59.198000 audit: BPF prog-id=8 op=LOAD Feb 12 19:14:59.199147 systemd[1]: Starting systemd-udevd.service... Feb 12 19:14:59.216137 systemd-udevd[476]: Using default interface naming scheme 'v252'. Feb 12 19:14:59.226000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.221402 systemd[1]: Started systemd-udevd.service. Feb 12 19:14:59.232565 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:14:59.243189 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Feb 12 19:14:59.271691 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:14:59.277000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.278080 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:14:59.313316 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:14:59.323000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.370179 kernel: hv_vmbus: Vmbus version:5.3 Feb 12 19:14:59.387184 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:14:59.387229 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:14:59.404113 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:14:59.404175 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Feb 12 19:14:59.405343 kernel: scsi host0: storvsc_host_t Feb 12 19:14:59.424649 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:14:59.424694 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Feb 12 19:14:59.424704 kernel: scsi host1: storvsc_host_t Feb 12 19:14:59.424737 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:14:59.445281 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:14:59.445461 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:14:59.475849 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 12 19:14:59.476070 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:14:59.483530 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:14:59.483676 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:14:59.493488 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 19:14:59.493622 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:14:59.501667 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:14:59.501816 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:14:59.509173 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:14:59.515174 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 19:14:59.534185 kernel: hv_netvsc 002248b7-a1f8-0022-48b7-a1f8002248b7 eth0: VF slot 1 added Feb 12 19:14:59.547179 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:14:59.561680 kernel: hv_pci 8159f032-04d3-461e-9012-b73882ba26fb: PCI VMBus probing: Using version 0x10004 Feb 12 19:14:59.577202 kernel: hv_pci 8159f032-04d3-461e-9012-b73882ba26fb: PCI host bridge to bus 04d3:00 Feb 12 19:14:59.577372 kernel: pci_bus 04d3:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 12 19:14:59.584203 kernel: pci_bus 04d3:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:14:59.592501 kernel: pci 04d3:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 12 19:14:59.606090 kernel: pci 04d3:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:14:59.628379 kernel: pci 04d3:00:02.0: enabling Extended Tags Feb 12 19:14:59.650196 kernel: pci 04d3:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 04d3:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 12 19:14:59.664695 kernel: pci_bus 04d3:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:14:59.664869 kernel: pci 04d3:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:14:59.707179 kernel: mlx5_core 04d3:00:02.0: firmware version: 16.30.1284 Feb 12 19:14:59.875176 kernel: mlx5_core 04d3:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 12 19:14:59.940829 kernel: hv_netvsc 002248b7-a1f8-0022-48b7-a1f8002248b7 eth0: VF registering: eth1 Feb 12 19:14:59.941031 kernel: mlx5_core 04d3:00:02.0 eth1: joined to eth0 Feb 12 19:14:59.960181 kernel: mlx5_core 04d3:00:02.0 enP1235s1: renamed from eth1 Feb 12 19:14:59.966038 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:15:00.042660 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (539) Feb 12 19:15:00.019644 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:15:00.255114 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:15:00.270578 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:15:00.278378 systemd[1]: Starting disk-uuid.service... Feb 12 19:15:00.389367 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:15:01.308181 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:15:01.308367 disk-uuid[601]: The operation has completed successfully. Feb 12 19:15:01.372553 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:15:01.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.372640 systemd[1]: Finished disk-uuid.service. Feb 12 19:15:01.378076 systemd[1]: Starting verity-setup.service... Feb 12 19:15:01.432178 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:15:01.632092 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:15:01.639462 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:15:01.653587 systemd[1]: Finished verity-setup.service. Feb 12 19:15:01.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.711178 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:15:01.711728 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:15:01.716114 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:15:01.716872 systemd[1]: Starting ignition-setup.service... Feb 12 19:15:01.725786 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:15:01.767237 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:15:01.767272 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:15:01.767282 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:15:01.818567 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:15:01.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.827000 audit: BPF prog-id=9 op=LOAD Feb 12 19:15:01.828711 systemd[1]: Starting systemd-networkd.service... Feb 12 19:15:01.853781 systemd-networkd[868]: lo: Link UP Feb 12 19:15:01.853792 systemd-networkd[868]: lo: Gained carrier Feb 12 19:15:01.863000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.854221 systemd-networkd[868]: Enumeration completed Feb 12 19:15:01.854491 systemd[1]: Started systemd-networkd.service. Feb 12 19:15:01.863015 systemd-networkd[868]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:15:01.863976 systemd[1]: Reached target network.target. Feb 12 19:15:01.898000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.876242 systemd[1]: Starting iscsiuio.service... Feb 12 19:15:01.887543 systemd[1]: Started iscsiuio.service. Feb 12 19:15:01.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.900121 systemd[1]: Starting iscsid.service... Feb 12 19:15:01.932239 iscsid[876]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:15:01.932239 iscsid[876]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 19:15:01.932239 iscsid[876]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:15:01.932239 iscsid[876]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:15:01.932239 iscsid[876]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:15:01.932239 iscsid[876]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:15:01.932239 iscsid[876]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:15:02.068529 kernel: kauditd_printk_skb: 15 callbacks suppressed Feb 12 19:15:02.068556 kernel: audit: type=1130 audit(1707765301.989:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.989000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.914964 systemd[1]: Started iscsid.service. Feb 12 19:15:01.920125 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:15:02.092864 kernel: mlx5_core 04d3:00:02.0 enP1235s1: Link up Feb 12 19:15:01.937273 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:15:02.134198 kernel: audit: type=1130 audit(1707765302.098:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:02.134235 kernel: hv_netvsc 002248b7-a1f8-0022-48b7-a1f8002248b7 eth0: Data path switched to VF: enP1235s1 Feb 12 19:15:02.098000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:01.968650 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:15:01.989866 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:15:02.151068 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:15:02.037206 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:15:02.047246 systemd[1]: Reached target remote-fs.target. Feb 12 19:15:02.067467 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:15:02.093216 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:15:02.145945 systemd-networkd[868]: enP1235s1: Link UP Feb 12 19:15:02.146017 systemd-networkd[868]: eth0: Link UP Feb 12 19:15:02.180000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:02.146130 systemd-networkd[868]: eth0: Gained carrier Feb 12 19:15:02.211434 kernel: audit: type=1130 audit(1707765302.180:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:02.156590 systemd-networkd[868]: enP1235s1: Gained carrier Feb 12 19:15:02.172413 systemd-networkd[868]: eth0: DHCPv4 address 10.200.20.36/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:15:02.175050 systemd[1]: Finished ignition-setup.service. Feb 12 19:15:02.210848 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:15:04.075311 systemd-networkd[868]: eth0: Gained IPv6LL Feb 12 19:15:06.119371 ignition[895]: Ignition 2.14.0 Feb 12 19:15:06.119382 ignition[895]: Stage: fetch-offline Feb 12 19:15:06.119437 ignition[895]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:06.119460 ignition[895]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:06.229046 ignition[895]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:06.229211 ignition[895]: parsed url from cmdline: "" Feb 12 19:15:06.232413 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:15:06.274071 kernel: audit: type=1130 audit(1707765306.244:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.229214 ignition[895]: no config URL provided Feb 12 19:15:06.246102 systemd[1]: Starting ignition-fetch.service... Feb 12 19:15:06.229220 ignition[895]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:15:06.229229 ignition[895]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:15:06.229234 ignition[895]: failed to fetch config: resource requires networking Feb 12 19:15:06.229470 ignition[895]: Ignition finished successfully Feb 12 19:15:06.277598 ignition[901]: Ignition 2.14.0 Feb 12 19:15:06.277605 ignition[901]: Stage: fetch Feb 12 19:15:06.277705 ignition[901]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:06.277723 ignition[901]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:06.282194 ignition[901]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:06.282347 ignition[901]: parsed url from cmdline: "" Feb 12 19:15:06.282351 ignition[901]: no config URL provided Feb 12 19:15:06.282357 ignition[901]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:15:06.282368 ignition[901]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:15:06.282403 ignition[901]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:15:06.305721 ignition[901]: GET result: OK Feb 12 19:15:06.305799 ignition[901]: config has been read from IMDS userdata Feb 12 19:15:06.305858 ignition[901]: parsing config with SHA512: ae03bfe1c74313fe595efbb6c5db2316e49452204fb1728ad9e006e014b0fe4bebcbe262b987a46b05af65016695972244cefca88ddc5cad66648f44ad92c2a3 Feb 12 19:15:06.370081 unknown[901]: fetched base config from "system" Feb 12 19:15:06.370735 ignition[901]: fetch: fetch complete Feb 12 19:15:06.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.370089 unknown[901]: fetched base config from "system" Feb 12 19:15:06.422554 kernel: audit: type=1130 audit(1707765306.385:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.370741 ignition[901]: fetch: fetch passed Feb 12 19:15:06.370094 unknown[901]: fetched user config from "azure" Feb 12 19:15:06.370784 ignition[901]: Ignition finished successfully Feb 12 19:15:06.375886 systemd[1]: Finished ignition-fetch.service. Feb 12 19:15:06.481473 kernel: audit: type=1130 audit(1707765306.444:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.424581 ignition[907]: Ignition 2.14.0 Feb 12 19:15:06.411792 systemd[1]: Starting ignition-kargs.service... Feb 12 19:15:06.424587 ignition[907]: Stage: kargs Feb 12 19:15:06.438070 systemd[1]: Finished ignition-kargs.service. Feb 12 19:15:06.506000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.424695 ignition[907]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:06.445309 systemd[1]: Starting ignition-disks.service... Feb 12 19:15:06.424716 ignition[907]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:06.500546 systemd[1]: Finished ignition-disks.service. Feb 12 19:15:06.563326 kernel: audit: type=1130 audit(1707765306.506:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.428271 ignition[907]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:06.532726 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:15:06.435413 ignition[907]: kargs: kargs passed Feb 12 19:15:06.546971 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:15:06.435488 ignition[907]: Ignition finished successfully Feb 12 19:15:06.557882 systemd[1]: Reached target local-fs.target. Feb 12 19:15:06.486689 ignition[913]: Ignition 2.14.0 Feb 12 19:15:06.568744 systemd[1]: Reached target sysinit.target. Feb 12 19:15:06.486697 ignition[913]: Stage: disks Feb 12 19:15:06.580683 systemd[1]: Reached target basic.target. Feb 12 19:15:06.486833 ignition[913]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:06.596625 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:15:06.486865 ignition[913]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:06.496515 ignition[913]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:06.498372 ignition[913]: disks: disks passed Feb 12 19:15:06.498439 ignition[913]: Ignition finished successfully Feb 12 19:15:06.672524 systemd-fsck[921]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 12 19:15:06.677662 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:15:06.694000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.717362 systemd[1]: Mounting sysroot.mount... Feb 12 19:15:06.722008 kernel: audit: type=1130 audit(1707765306.694:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.743217 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:15:06.743669 systemd[1]: Mounted sysroot.mount. Feb 12 19:15:06.748648 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:15:06.793632 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:15:06.799401 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:15:06.816914 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:15:06.816958 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:15:06.839434 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:15:06.886122 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:15:06.892425 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:15:06.923202 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (932) Feb 12 19:15:06.931405 initrd-setup-root[937]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:15:06.945147 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:15:06.945196 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:15:06.951995 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:15:06.955743 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:15:06.983786 initrd-setup-root[963]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:15:06.994417 initrd-setup-root[971]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:15:07.005438 initrd-setup-root[979]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:15:07.521253 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:15:07.526000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.527839 systemd[1]: Starting ignition-mount.service... Feb 12 19:15:07.566910 kernel: audit: type=1130 audit(1707765307.526:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.556662 systemd[1]: Starting sysroot-boot.service... Feb 12 19:15:07.563702 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:15:07.563821 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:15:07.595488 ignition[998]: INFO : Ignition 2.14.0 Feb 12 19:15:07.600958 ignition[998]: INFO : Stage: mount Feb 12 19:15:07.606500 ignition[998]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:07.606500 ignition[998]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:07.623000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.616949 systemd[1]: Finished sysroot-boot.service. Feb 12 19:15:07.681712 kernel: audit: type=1130 audit(1707765307.623:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.681735 kernel: audit: type=1130 audit(1707765307.660:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.660000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.681778 ignition[998]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:07.681778 ignition[998]: INFO : mount: mount passed Feb 12 19:15:07.681778 ignition[998]: INFO : Ignition finished successfully Feb 12 19:15:07.623661 systemd[1]: Finished ignition-mount.service. Feb 12 19:15:08.410401 coreos-metadata[931]: Feb 12 19:15:08.410 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:15:08.422226 coreos-metadata[931]: Feb 12 19:15:08.422 INFO Fetch successful Feb 12 19:15:08.458815 coreos-metadata[931]: Feb 12 19:15:08.458 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:15:08.473888 coreos-metadata[931]: Feb 12 19:15:08.473 INFO Fetch successful Feb 12 19:15:08.479711 coreos-metadata[931]: Feb 12 19:15:08.479 INFO wrote hostname ci-3510.3.2-a-f1f3323662 to /sysroot/etc/hostname Feb 12 19:15:08.481813 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:15:08.493000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:08.516119 systemd[1]: Starting ignition-files.service... Feb 12 19:15:08.524650 kernel: audit: type=1130 audit(1707765308.493:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:08.527523 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:15:08.555346 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1010) Feb 12 19:15:08.555383 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:15:08.555393 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:15:08.565664 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:15:08.570563 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:15:08.584636 ignition[1029]: INFO : Ignition 2.14.0 Feb 12 19:15:08.584636 ignition[1029]: INFO : Stage: files Feb 12 19:15:08.594963 ignition[1029]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:08.594963 ignition[1029]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:08.594963 ignition[1029]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:08.594963 ignition[1029]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:15:08.594963 ignition[1029]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:15:08.594963 ignition[1029]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:15:08.750608 ignition[1029]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:15:08.760830 ignition[1029]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:15:08.760830 ignition[1029]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:15:08.760830 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 12 19:15:08.760830 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.26.0/crictl-v1.26.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:15:08.759724 unknown[1029]: wrote ssh authorized keys file for user: core Feb 12 19:15:09.259326 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:15:09.400484 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: 4c7e4541123cbd6f1d6fec1f827395cd58d65716c0998de790f965485738b6d6257c0dc46fd7f66403166c299f6d5bf9ff30b6e1ff9afbb071f17005e834518c Feb 12 19:15:09.421666 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.26.0-linux-arm64.tar.gz" Feb 12 19:15:09.421666 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:15:09.421666 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 12 19:15:09.784308 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:15:10.084614 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:15:10.098634 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 12 19:15:10.098634 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.1.1/cni-plugins-linux-arm64-v1.1.1.tgz: attempt #1 Feb 12 19:15:10.490029 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:15:10.705451 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: 6b5df61a53601926e4b5a9174828123d555f592165439f541bc117c68781f41c8bd30dccd52367e406d104df849bcbcfb72d9c4bafda4b045c59ce95d0ca0742 Feb 12 19:15:10.722317 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.1.1.tgz" Feb 12 19:15:10.722317 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:15:10.722317 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubectl: attempt #1 Feb 12 19:15:10.928706 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:15:11.234106 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 3672fda0beebbbd636a2088f427463cbad32683ea4fbb1df61650552e63846b6a47db803ccb70c3db0a8f24746a23a5632bdc15a3fb78f4f7d833e7f86763c2a Feb 12 19:15:11.250129 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:15:11.250129 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:15:11.250129 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:15:11.296399 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:15:11.565139 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 46c9f489062bdb84574703f7339d140d7e42c9c71b367cd860071108a3c1d38fabda2ef69f9c0ff88f7c80e88d38f96ab2248d4c9a6c9c60b0a4c20fd640d0db Feb 12 19:15:11.584524 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:15:11.584524 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:15:11.584524 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.26.5/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:15:11.627260 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:15:12.287401 ignition[1029]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 0e4ee1f23bf768c49d09beb13a6b5fad6efc8e3e685e7c5610188763e3af55923fb46158b5e76973a0f9a055f9b30d525b467c53415f965536adc2f04d9cf18d Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:15:12.307924 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:15:12.595689 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1034) Feb 12 19:15:12.595716 kernel: audit: type=1130 audit(1707765312.455:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.595727 kernel: audit: type=1130 audit(1707765312.528:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.595742 kernel: audit: type=1131 audit(1707765312.528:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.528000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.528000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1563804853" Feb 12 19:15:12.595838 ignition[1029]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1563804853": device or resource busy Feb 12 19:15:12.595838 ignition[1029]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1563804853", trying btrfs: device or resource busy Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1563804853" Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1563804853" Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem1563804853" Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem1563804853" Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem916263025" Feb 12 19:15:12.595838 ignition[1029]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem916263025": device or resource busy Feb 12 19:15:12.595838 ignition[1029]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem916263025", trying btrfs: device or resource busy Feb 12 19:15:12.595838 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem916263025" Feb 12 19:15:12.894623 kernel: audit: type=1130 audit(1707765312.629:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.894657 kernel: audit: type=1130 audit(1707765312.762:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.894667 kernel: audit: type=1131 audit(1707765312.797:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.629000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.797000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.389496 systemd[1]: mnt-oem1563804853.mount: Deactivated successfully. Feb 12 19:15:12.906484 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem916263025" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem916263025" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem916263025" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(19): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(19): op(1a): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(19): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(1b): [started] processing unit "prepare-critools.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(1b): [finished] processing unit "prepare-critools.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(1d): [started] processing unit "prepare-helm.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:15:12.906484 ignition[1029]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:15:13.223543 kernel: audit: type=1130 audit(1707765312.948:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.223581 kernel: audit: type=1131 audit(1707765313.079:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.948000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.079000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.428025 systemd[1]: mnt-oem916263025.mount: Deactivated successfully. Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(1d): [finished] processing unit "prepare-helm.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(1f): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(1f): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(20): [started] setting preset to enabled for "waagent.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(20): [finished] setting preset to enabled for "waagent.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(21): [started] setting preset to enabled for "nvidia.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(21): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(22): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(23): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:15:13.235458 ignition[1029]: INFO : files: files passed Feb 12 19:15:13.235458 ignition[1029]: INFO : Ignition finished successfully Feb 12 19:15:13.491744 kernel: audit: type=1131 audit(1707765313.296:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.491773 kernel: audit: type=1131 audit(1707765313.354:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.491790 kernel: audit: type=1131 audit(1707765313.400:48): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.354000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.433000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.449000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.439291 systemd[1]: Finished ignition-files.service. Feb 12 19:15:13.500315 initrd-setup-root-after-ignition[1054]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:15:13.510000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.522339 iscsid[876]: iscsid shutting down. Feb 12 19:15:12.456133 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:15:13.531000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.489829 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:15:13.544000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.490637 systemd[1]: Starting ignition-quench.service... Feb 12 19:15:13.562000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.562000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.510527 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:15:13.574000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.510638 systemd[1]: Finished ignition-quench.service. Feb 12 19:15:13.586000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.612757 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:15:13.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.668079 systemd[1]: Reached target ignition-complete.target. Feb 12 19:15:13.606000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.611696 ignition[1067]: INFO : Ignition 2.14.0 Feb 12 19:15:13.611696 ignition[1067]: INFO : Stage: umount Feb 12 19:15:13.611696 ignition[1067]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:13.611696 ignition[1067]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:13.611696 ignition[1067]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:13.611696 ignition[1067]: INFO : umount: umount passed Feb 12 19:15:13.611696 ignition[1067]: INFO : Ignition finished successfully Feb 12 19:15:13.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.699009 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:15:13.692000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.742206 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:15:12.742326 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:15:13.710000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.797961 systemd[1]: Reached target initrd-fs.target. Feb 12 19:15:13.718000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.836015 systemd[1]: Reached target initrd.target. Feb 12 19:15:12.857552 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:15:12.874895 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:15:13.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:12.931981 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:15:12.989141 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:15:13.012037 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:15:13.025726 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:15:13.784000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.040383 systemd[1]: Stopped target timers.target. Feb 12 19:15:13.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.059873 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:15:13.805000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:15:13.059937 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:15:13.822000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.111273 systemd[1]: Stopped target initrd.target. Feb 12 19:15:13.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.125633 systemd[1]: Stopped target basic.target. Feb 12 19:15:13.840000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.143708 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:15:13.163253 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:15:13.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.177753 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:15:13.191939 systemd[1]: Stopped target remote-fs.target. Feb 12 19:15:13.210536 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:15:13.229190 systemd[1]: Stopped target sysinit.target. Feb 12 19:15:13.891000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.240386 systemd[1]: Stopped target local-fs.target. Feb 12 19:15:13.901000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.253466 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:15:13.909000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.267954 systemd[1]: Stopped target swap.target. Feb 12 19:15:13.281669 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:15:13.281735 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:15:13.325264 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:15:13.952423 kernel: hv_netvsc 002248b7-a1f8-0022-48b7-a1f8002248b7 eth0: Data path switched from VF: enP1235s1 Feb 12 19:15:13.947000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.340756 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:15:13.957000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.340814 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:15:13.967000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.385033 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:15:13.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.978000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.385088 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:15:13.400637 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:15:13.400674 systemd[1]: Stopped ignition-files.service. Feb 12 19:15:13.433956 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:15:13.434004 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:15:13.460896 systemd[1]: Stopping ignition-mount.service... Feb 12 19:15:13.485897 systemd[1]: Stopping iscsid.service... Feb 12 19:15:13.496635 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:15:13.504885 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:15:13.504947 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:15:13.510509 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:15:13.510548 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:15:13.532255 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:15:13.532368 systemd[1]: Stopped iscsid.service. Feb 12 19:15:13.545033 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:15:13.545118 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:15:14.064000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:13.563278 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:15:13.563367 systemd[1]: Stopped ignition-mount.service. Feb 12 19:15:13.575605 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:15:13.576052 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:15:13.576094 systemd[1]: Stopped ignition-disks.service. Feb 12 19:15:13.586304 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:15:13.586355 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:15:13.596014 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:15:13.596053 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:15:13.608942 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:15:14.140656 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). Feb 12 19:15:13.609002 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:15:13.616811 systemd[1]: Stopped target paths.target. Feb 12 19:15:13.625447 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:15:13.637044 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:15:13.642759 systemd[1]: Stopped target slices.target. Feb 12 19:15:13.661835 systemd[1]: Stopped target sockets.target. Feb 12 19:15:13.673170 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:15:13.673221 systemd[1]: Closed iscsid.socket. Feb 12 19:15:13.682586 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:15:13.682628 systemd[1]: Stopped ignition-setup.service. Feb 12 19:15:13.694407 systemd[1]: Stopping iscsiuio.service... Feb 12 19:15:13.700954 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:15:13.701058 systemd[1]: Stopped iscsiuio.service. Feb 12 19:15:13.710399 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:15:13.710484 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:15:13.718671 systemd[1]: Stopped target network.target. Feb 12 19:15:13.727623 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:15:13.727656 systemd[1]: Closed iscsiuio.socket. Feb 12 19:15:13.736094 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:15:13.736139 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:15:13.749007 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:15:13.758065 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:15:13.772090 systemd-networkd[868]: eth0: DHCPv6 lease lost Feb 12 19:15:14.141000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:15:13.773495 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:15:13.773592 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:15:13.784934 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:15:13.785054 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:15:13.797114 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:15:13.797246 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:15:13.806986 systemd[1]: Stopping network-cleanup.service... Feb 12 19:15:13.817458 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:15:13.817521 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:15:13.822578 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:15:13.822629 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:15:13.835289 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:15:13.835341 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:15:13.840851 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:15:13.850268 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:15:13.850769 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:15:13.850896 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:15:13.859109 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:15:13.859172 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:15:13.873821 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:15:13.873865 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:15:13.882905 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:15:13.882956 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:15:13.892222 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:15:13.892271 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:15:13.901245 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:15:13.901280 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:15:13.914793 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:15:13.938679 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:15:13.938758 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:15:13.952320 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:15:13.952376 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:15:13.957598 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:15:13.957643 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:15:13.969119 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:15:13.969588 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:15:13.969662 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:15:14.054727 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:15:14.054945 systemd[1]: Stopped network-cleanup.service. Feb 12 19:15:14.065015 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:15:14.075807 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:15:14.093577 systemd[1]: Switching root. Feb 12 19:15:14.142333 systemd-journald[276]: Journal stopped Feb 12 19:15:27.750505 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:15:27.750526 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:15:27.750536 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:15:27.750546 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:15:27.750553 kernel: SELinux: policy capability open_perms=1 Feb 12 19:15:27.750561 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:15:27.750570 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:15:27.750578 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:15:27.750586 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:15:27.750594 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:15:27.750609 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:15:27.750618 systemd[1]: Successfully loaded SELinux policy in 325.402ms. Feb 12 19:15:27.750628 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 31.121ms. Feb 12 19:15:27.750638 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:15:27.750649 systemd[1]: Detected virtualization microsoft. Feb 12 19:15:27.750658 systemd[1]: Detected architecture arm64. Feb 12 19:15:27.750667 systemd[1]: Detected first boot. Feb 12 19:15:27.750676 systemd[1]: Hostname set to . Feb 12 19:15:27.750685 systemd[1]: Initializing machine ID from random generator. Feb 12 19:15:27.750693 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:15:27.750701 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 12 19:15:27.750711 kernel: audit: type=1400 audit(1707765319.114:89): avc: denied { associate } for pid=1100 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:15:27.750722 kernel: audit: type=1300 audit(1707765319.114:89): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1083 pid=1100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:27.750732 kernel: audit: type=1327 audit(1707765319.114:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:15:27.750741 kernel: audit: type=1400 audit(1707765319.129:90): avc: denied { associate } for pid=1100 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:15:27.750750 kernel: audit: type=1300 audit(1707765319.129:90): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1083 pid=1100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:27.750759 kernel: audit: type=1307 audit(1707765319.129:90): cwd="/" Feb 12 19:15:27.750769 kernel: audit: type=1302 audit(1707765319.129:90): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:27.750778 kernel: audit: type=1302 audit(1707765319.129:90): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:27.750788 kernel: audit: type=1327 audit(1707765319.129:90): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:15:27.750797 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:15:27.750807 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:15:27.750816 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:15:27.750827 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:15:27.750836 kernel: audit: type=1334 audit(1707765326.932:91): prog-id=12 op=LOAD Feb 12 19:15:27.750845 kernel: audit: type=1334 audit(1707765326.932:92): prog-id=3 op=UNLOAD Feb 12 19:15:27.750853 kernel: audit: type=1334 audit(1707765326.942:93): prog-id=13 op=LOAD Feb 12 19:15:27.750862 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:15:27.750870 kernel: audit: type=1334 audit(1707765326.951:94): prog-id=14 op=LOAD Feb 12 19:15:27.750879 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:15:27.750890 kernel: audit: type=1334 audit(1707765326.951:95): prog-id=4 op=UNLOAD Feb 12 19:15:27.750900 kernel: audit: type=1334 audit(1707765326.951:96): prog-id=5 op=UNLOAD Feb 12 19:15:27.750910 kernel: audit: type=1131 audit(1707765326.952:97): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.750918 kernel: audit: type=1334 audit(1707765327.034:98): prog-id=12 op=UNLOAD Feb 12 19:15:27.750927 kernel: audit: type=1130 audit(1707765327.048:99): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.750936 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:15:27.750946 kernel: audit: type=1131 audit(1707765327.048:100): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.750955 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:15:27.750966 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:15:27.750975 systemd[1]: Created slice system-getty.slice. Feb 12 19:15:27.750985 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:15:27.750994 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:15:27.751004 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:15:27.751014 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:15:27.751023 systemd[1]: Created slice user.slice. Feb 12 19:15:27.751032 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:15:27.751041 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:15:27.751052 systemd[1]: Set up automount boot.automount. Feb 12 19:15:27.751061 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:15:27.751070 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:15:27.751079 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:15:27.751088 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:15:27.751097 systemd[1]: Reached target integritysetup.target. Feb 12 19:15:27.751107 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:15:27.751116 systemd[1]: Reached target remote-fs.target. Feb 12 19:15:27.751126 systemd[1]: Reached target slices.target. Feb 12 19:15:27.751135 systemd[1]: Reached target swap.target. Feb 12 19:15:27.751144 systemd[1]: Reached target torcx.target. Feb 12 19:15:27.751162 systemd[1]: Reached target veritysetup.target. Feb 12 19:15:27.751172 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:15:27.751181 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:15:27.751190 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:15:27.751202 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:15:27.751212 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:15:27.751221 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:15:27.751231 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:15:27.751240 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:15:27.751250 systemd[1]: Mounting media.mount... Feb 12 19:15:27.751260 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:15:27.751270 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:15:27.751279 systemd[1]: Mounting tmp.mount... Feb 12 19:15:27.751289 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:15:27.751298 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:15:27.751307 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:15:27.751316 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:15:27.751326 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:15:27.751335 systemd[1]: Starting modprobe@drm.service... Feb 12 19:15:27.751346 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:15:27.751355 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:15:27.751364 systemd[1]: Starting modprobe@loop.service... Feb 12 19:15:27.751374 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:15:27.751384 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:15:27.751393 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:15:27.751403 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:15:27.751414 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:15:27.751423 systemd[1]: Stopped systemd-journald.service. Feb 12 19:15:27.751433 kernel: loop: module loaded Feb 12 19:15:27.751443 systemd[1]: systemd-journald.service: Consumed 3.900s CPU time. Feb 12 19:15:27.751452 systemd[1]: Starting systemd-journald.service... Feb 12 19:15:27.751461 kernel: fuse: init (API version 7.34) Feb 12 19:15:27.751470 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:15:27.751479 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:15:27.751488 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:15:27.751498 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:15:27.751507 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:15:27.751518 systemd[1]: Stopped verity-setup.service. Feb 12 19:15:27.751527 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:15:27.751536 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:15:27.751550 systemd-journald[1206]: Journal started Feb 12 19:15:27.751591 systemd-journald[1206]: Runtime Journal (/run/log/journal/bc55bbea4146462287e679411c887bf3) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:15:16.661000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:15:17.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:15:17.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:15:17.494000 audit: BPF prog-id=10 op=LOAD Feb 12 19:15:17.494000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:15:17.494000 audit: BPF prog-id=11 op=LOAD Feb 12 19:15:17.494000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:15:19.114000 audit[1100]: AVC avc: denied { associate } for pid=1100 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:15:19.114000 audit[1100]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1083 pid=1100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:19.114000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:15:19.129000 audit[1100]: AVC avc: denied { associate } for pid=1100 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:15:19.129000 audit[1100]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1083 pid=1100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:19.129000 audit: CWD cwd="/" Feb 12 19:15:19.129000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:19.129000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:19.129000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:15:26.932000 audit: BPF prog-id=12 op=LOAD Feb 12 19:15:26.932000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:15:26.942000 audit: BPF prog-id=13 op=LOAD Feb 12 19:15:26.951000 audit: BPF prog-id=14 op=LOAD Feb 12 19:15:26.951000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:15:26.951000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:15:26.952000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.034000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:15:27.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.048000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.599000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.616000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.634000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.643000 audit: BPF prog-id=15 op=LOAD Feb 12 19:15:27.643000 audit: BPF prog-id=16 op=LOAD Feb 12 19:15:27.643000 audit: BPF prog-id=17 op=LOAD Feb 12 19:15:27.643000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:15:27.643000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:15:27.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.748000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:15:27.748000 audit[1206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffd3efb1f0 a2=4000 a3=1 items=0 ppid=1 pid=1206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:27.748000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:15:26.931190 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:15:19.057495 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:15:26.952458 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:15:19.057976 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:15:26.952815 systemd[1]: systemd-journald.service: Consumed 3.900s CPU time. Feb 12 19:15:19.057999 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:15:19.058037 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:15:19.058047 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:15:19.058073 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:15:19.058085 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:15:19.058301 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:15:19.058333 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:15:19.058345 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:15:19.093306 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:15:19.093340 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:15:19.093359 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:15:19.093373 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:15:19.093391 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:15:19.093404 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:19Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:15:25.508711 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:25Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:15:25.509003 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:25Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:15:25.509107 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:25Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:15:25.509286 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:25Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:15:25.509347 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:25Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:15:25.509412 /usr/lib/systemd/system-generators/torcx-generator[1100]: time="2024-02-12T19:15:25Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:15:27.762724 systemd[1]: Started systemd-journald.service. Feb 12 19:15:27.762000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.763503 systemd[1]: Mounted media.mount. Feb 12 19:15:27.767886 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:15:27.773299 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:15:27.778710 systemd[1]: Mounted tmp.mount. Feb 12 19:15:27.783330 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:15:27.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.789816 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:15:27.794000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.795482 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:15:27.795604 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:15:27.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.800000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.801113 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:15:27.801237 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:15:27.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.805000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.806272 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:15:27.806383 systemd[1]: Finished modprobe@drm.service. Feb 12 19:15:27.811000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.811000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.811500 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:15:27.811614 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:15:27.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.817000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.817958 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:15:27.818066 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:15:27.823000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.823000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.823604 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:15:27.823752 systemd[1]: Finished modprobe@loop.service. Feb 12 19:15:27.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.828000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.829115 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:15:27.835000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.835634 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:15:27.840000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.841404 systemd[1]: Reached target network-pre.target. Feb 12 19:15:27.848198 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:15:27.855609 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:15:27.860467 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:15:27.888964 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:15:27.895063 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:15:27.900440 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:15:27.901555 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:15:27.906060 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:15:27.907151 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:15:27.913579 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:15:27.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.918746 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:15:27.923000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.924099 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:15:27.929925 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:15:27.936403 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:15:27.941744 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:15:27.952226 udevadm[1220]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:15:27.964320 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:15:27.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.969953 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:15:27.980971 systemd-journald[1206]: Time spent on flushing to /var/log/journal/bc55bbea4146462287e679411c887bf3 is 14.581ms for 1134 entries. Feb 12 19:15:27.980971 systemd-journald[1206]: System Journal (/var/log/journal/bc55bbea4146462287e679411c887bf3) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:15:28.061260 systemd-journald[1206]: Received client request to flush runtime journal. Feb 12 19:15:28.022000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:28.017276 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:15:28.062275 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:15:28.068000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:28.572174 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:15:28.577000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:28.578405 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:15:28.981234 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:15:28.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:29.132635 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:15:29.137000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:29.138000 audit: BPF prog-id=18 op=LOAD Feb 12 19:15:29.138000 audit: BPF prog-id=19 op=LOAD Feb 12 19:15:29.138000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:15:29.138000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:15:29.138917 systemd[1]: Starting systemd-udevd.service... Feb 12 19:15:29.156925 systemd-udevd[1225]: Using default interface naming scheme 'v252'. Feb 12 19:15:29.447601 systemd[1]: Started systemd-udevd.service. Feb 12 19:15:29.457000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:29.458000 audit: BPF prog-id=20 op=LOAD Feb 12 19:15:29.459608 systemd[1]: Starting systemd-networkd.service... Feb 12 19:15:29.488768 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:15:29.544180 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:15:29.545682 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:15:29.544000 audit: BPF prog-id=21 op=LOAD Feb 12 19:15:29.544000 audit: BPF prog-id=22 op=LOAD Feb 12 19:15:29.544000 audit: BPF prog-id=23 op=LOAD Feb 12 19:15:29.558000 audit[1231]: AVC avc: denied { confidentiality } for pid=1231 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:15:29.580578 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:15:29.580699 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:15:29.580732 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:15:29.580754 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:15:29.580776 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 12 19:15:29.580796 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:15:29.592917 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:15:29.598234 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:15:29.558000 audit[1231]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaafd8eb910 a1=aa2c a2=ffffa70324b0 a3=aaaafd84b010 items=12 ppid=1225 pid=1231 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:29.558000 audit: CWD cwd="/" Feb 12 19:15:29.558000 audit: PATH item=0 name=(null) inode=6094 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=1 name=(null) inode=11157 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=2 name=(null) inode=11157 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=3 name=(null) inode=11158 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=4 name=(null) inode=11157 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=5 name=(null) inode=11159 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=6 name=(null) inode=11157 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=7 name=(null) inode=11160 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=8 name=(null) inode=11157 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=9 name=(null) inode=11161 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=10 name=(null) inode=11157 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PATH item=11 name=(null) inode=11162 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:29.558000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:15:29.617138 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:15:29.617248 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:15:29.618206 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:15:29.624427 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:15:29.628013 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:15:30.086098 systemd[1]: Started systemd-userdbd.service. Feb 12 19:15:30.089000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:30.467446 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1242) Feb 12 19:15:30.481873 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:15:30.490755 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:15:30.495000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:30.496961 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:15:30.503624 systemd-networkd[1246]: lo: Link UP Feb 12 19:15:30.503635 systemd-networkd[1246]: lo: Gained carrier Feb 12 19:15:30.504010 systemd-networkd[1246]: Enumeration completed Feb 12 19:15:30.504139 systemd[1]: Started systemd-networkd.service. Feb 12 19:15:30.508000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:30.510002 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:15:30.550834 systemd-networkd[1246]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:15:30.599428 kernel: mlx5_core 04d3:00:02.0 enP1235s1: Link up Feb 12 19:15:30.628432 kernel: hv_netvsc 002248b7-a1f8-0022-48b7-a1f8002248b7 eth0: Data path switched to VF: enP1235s1 Feb 12 19:15:30.629464 systemd-networkd[1246]: enP1235s1: Link UP Feb 12 19:15:30.629905 systemd-networkd[1246]: eth0: Link UP Feb 12 19:15:30.630000 systemd-networkd[1246]: eth0: Gained carrier Feb 12 19:15:30.637891 systemd-networkd[1246]: enP1235s1: Gained carrier Feb 12 19:15:30.645543 systemd-networkd[1246]: eth0: DHCPv4 address 10.200.20.36/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:15:30.852349 lvm[1302]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:15:30.896341 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:15:30.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:30.901511 systemd[1]: Reached target cryptsetup.target. Feb 12 19:15:30.907643 systemd[1]: Starting lvm2-activation.service... Feb 12 19:15:30.911527 lvm[1305]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:15:30.929364 systemd[1]: Finished lvm2-activation.service. Feb 12 19:15:30.933000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:30.934584 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:15:30.939634 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:15:30.939661 systemd[1]: Reached target local-fs.target. Feb 12 19:15:30.944591 systemd[1]: Reached target machines.target. Feb 12 19:15:30.950612 systemd[1]: Starting ldconfig.service... Feb 12 19:15:30.970752 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:15:30.970810 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:15:30.971947 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:15:30.977481 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:15:30.985237 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:15:30.990525 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:15:30.990584 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:15:30.991733 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:15:31.005084 systemd-tmpfiles[1310]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:15:31.025374 systemd-tmpfiles[1310]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:15:31.026720 systemd-tmpfiles[1310]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:15:31.068300 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1307 (bootctl) Feb 12 19:15:31.069557 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:15:31.104702 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:15:31.110000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:31.657214 systemd-fsck[1315]: fsck.fat 4.2 (2021-01-31) Feb 12 19:15:31.657214 systemd-fsck[1315]: /dev/sda1: 236 files, 113719/258078 clusters Feb 12 19:15:31.659867 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:15:31.665000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:31.667791 systemd[1]: Mounting boot.mount... Feb 12 19:15:31.719391 systemd[1]: Mounted boot.mount. Feb 12 19:15:31.730627 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:15:31.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:31.772637 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:15:31.773200 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:15:31.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.347585 systemd-networkd[1246]: eth0: Gained IPv6LL Feb 12 19:15:32.353304 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:15:32.357000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.545186 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:15:32.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.551680 systemd[1]: Starting audit-rules.service... Feb 12 19:15:32.554415 kernel: kauditd_printk_skb: 73 callbacks suppressed Feb 12 19:15:32.554472 kernel: audit: type=1130 audit(1707765332.549:157): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.576783 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:15:32.582220 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:15:32.592000 audit: BPF prog-id=24 op=LOAD Feb 12 19:15:32.598972 systemd[1]: Starting systemd-resolved.service... Feb 12 19:15:32.600424 kernel: audit: type=1334 audit(1707765332.592:158): prog-id=24 op=LOAD Feb 12 19:15:32.604000 audit: BPF prog-id=25 op=LOAD Feb 12 19:15:32.606401 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:15:32.612440 kernel: audit: type=1334 audit(1707765332.604:159): prog-id=25 op=LOAD Feb 12 19:15:32.619748 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:15:32.679000 audit[1332]: SYSTEM_BOOT pid=1332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.695540 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:15:32.704912 kernel: audit: type=1127 audit(1707765332.679:160): pid=1332 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.705573 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:15:32.728125 kernel: audit: type=1130 audit(1707765332.703:161): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.728000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.729867 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:15:32.747431 kernel: audit: type=1130 audit(1707765332.728:162): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.753106 systemd[1]: Reached target time-set.target. Feb 12 19:15:32.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.777057 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:15:32.777414 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:15:32.779464 kernel: audit: type=1130 audit(1707765332.751:163): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.783000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.804430 kernel: audit: type=1130 audit(1707765332.783:164): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.863061 systemd-resolved[1325]: Positive Trust Anchors: Feb 12 19:15:32.863076 systemd-resolved[1325]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:15:32.863103 systemd-resolved[1325]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:15:32.925338 systemd-timesyncd[1326]: Contacted time server 162.159.200.1:123 (0.flatcar.pool.ntp.org). Feb 12 19:15:32.925483 systemd-timesyncd[1326]: Initial clock synchronization to Mon 2024-02-12 19:15:32.925918 UTC. Feb 12 19:15:32.946321 systemd-resolved[1325]: Using system hostname 'ci-3510.3.2-a-f1f3323662'. Feb 12 19:15:32.947902 systemd[1]: Started systemd-resolved.service. Feb 12 19:15:32.952776 systemd[1]: Reached target network.target. Feb 12 19:15:32.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.974657 systemd[1]: Reached target network-online.target. Feb 12 19:15:32.980642 kernel: audit: type=1130 audit(1707765332.951:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:32.981320 systemd[1]: Reached target nss-lookup.target. Feb 12 19:15:33.085905 augenrules[1342]: No rules Feb 12 19:15:33.084000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:15:33.092221 systemd[1]: Finished audit-rules.service. Feb 12 19:15:33.098559 kernel: audit: type=1305 audit(1707765333.084:166): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:15:33.084000 audit[1342]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffdf84ba0 a2=420 a3=0 items=0 ppid=1321 pid=1342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:33.084000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:15:40.027878 ldconfig[1306]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:15:40.037187 systemd[1]: Finished ldconfig.service. Feb 12 19:15:40.044314 systemd[1]: Starting systemd-update-done.service... Feb 12 19:15:40.105239 systemd[1]: Finished systemd-update-done.service. Feb 12 19:15:40.110991 systemd[1]: Reached target sysinit.target. Feb 12 19:15:40.115791 systemd[1]: Started motdgen.path. Feb 12 19:15:40.119896 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:15:40.127647 systemd[1]: Started logrotate.timer. Feb 12 19:15:40.133278 systemd[1]: Started mdadm.timer. Feb 12 19:15:40.137490 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:15:40.143070 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:15:40.143101 systemd[1]: Reached target paths.target. Feb 12 19:15:40.147839 systemd[1]: Reached target timers.target. Feb 12 19:15:40.153172 systemd[1]: Listening on dbus.socket. Feb 12 19:15:40.158728 systemd[1]: Starting docker.socket... Feb 12 19:15:40.179864 systemd[1]: Listening on sshd.socket. Feb 12 19:15:40.184770 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:15:40.185257 systemd[1]: Listening on docker.socket. Feb 12 19:15:40.190190 systemd[1]: Reached target sockets.target. Feb 12 19:15:40.195170 systemd[1]: Reached target basic.target. Feb 12 19:15:40.200122 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:15:40.200151 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:15:40.201236 systemd[1]: Starting containerd.service... Feb 12 19:15:40.206913 systemd[1]: Starting dbus.service... Feb 12 19:15:40.211510 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:15:40.217585 systemd[1]: Starting extend-filesystems.service... Feb 12 19:15:40.225804 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:15:40.226872 systemd[1]: Starting motdgen.service... Feb 12 19:15:40.231997 systemd[1]: Started nvidia.service. Feb 12 19:15:40.239531 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:15:40.245611 systemd[1]: Starting prepare-critools.service... Feb 12 19:15:40.253512 systemd[1]: Starting prepare-helm.service... Feb 12 19:15:40.258796 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:15:40.264716 systemd[1]: Starting sshd-keygen.service... Feb 12 19:15:40.271972 systemd[1]: Starting systemd-logind.service... Feb 12 19:15:40.276787 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:15:40.276848 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:15:40.277250 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:15:40.277909 systemd[1]: Starting update-engine.service... Feb 12 19:15:40.283899 jq[1352]: false Feb 12 19:15:40.284672 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:15:40.287260 jq[1372]: true Feb 12 19:15:40.296525 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:15:40.296705 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:15:40.310103 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:15:40.310498 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:15:40.316959 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:15:40.317123 systemd[1]: Finished motdgen.service. Feb 12 19:15:40.322884 extend-filesystems[1353]: Found sda Feb 12 19:15:40.327125 extend-filesystems[1353]: Found sda1 Feb 12 19:15:40.327125 extend-filesystems[1353]: Found sda2 Feb 12 19:15:40.327125 extend-filesystems[1353]: Found sda3 Feb 12 19:15:40.327125 extend-filesystems[1353]: Found usr Feb 12 19:15:40.327125 extend-filesystems[1353]: Found sda4 Feb 12 19:15:40.327125 extend-filesystems[1353]: Found sda6 Feb 12 19:15:40.327125 extend-filesystems[1353]: Found sda7 Feb 12 19:15:40.327125 extend-filesystems[1353]: Found sda9 Feb 12 19:15:40.327125 extend-filesystems[1353]: Checking size of /dev/sda9 Feb 12 19:15:40.370958 jq[1377]: true Feb 12 19:15:40.384825 env[1378]: time="2024-02-12T19:15:40.384776154Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:15:40.409477 systemd-logind[1369]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Feb 12 19:15:40.409651 systemd-logind[1369]: New seat seat0. Feb 12 19:15:40.417087 extend-filesystems[1353]: Old size kept for /dev/sda9 Feb 12 19:15:40.422710 extend-filesystems[1353]: Found sr0 Feb 12 19:15:40.417780 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.436551836Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.436693960Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.439578838Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.439613399Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.439833885Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.439850686Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.439864566Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.439874126Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.439938488Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:40.448912 env[1378]: time="2024-02-12T19:15:40.440096732Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:40.417952 systemd[1]: Finished extend-filesystems.service. Feb 12 19:15:40.451309 env[1378]: time="2024-02-12T19:15:40.440239336Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:15:40.451309 env[1378]: time="2024-02-12T19:15:40.440255217Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:15:40.451309 env[1378]: time="2024-02-12T19:15:40.440305178Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:15:40.451309 env[1378]: time="2024-02-12T19:15:40.440316498Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:15:40.453302 env[1378]: time="2024-02-12T19:15:40.453261649Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:15:40.453388 env[1378]: time="2024-02-12T19:15:40.453310650Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:15:40.453388 env[1378]: time="2024-02-12T19:15:40.453326251Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:15:40.453388 env[1378]: time="2024-02-12T19:15:40.453373532Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:15:40.453473 env[1378]: time="2024-02-12T19:15:40.453388372Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:15:40.453503 env[1378]: time="2024-02-12T19:15:40.453403613Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:15:40.453528 env[1378]: time="2024-02-12T19:15:40.453502615Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:15:40.453916 env[1378]: time="2024-02-12T19:15:40.453892586Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:15:40.453975 env[1378]: time="2024-02-12T19:15:40.453917147Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:15:40.453975 env[1378]: time="2024-02-12T19:15:40.453931747Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:15:40.453975 env[1378]: time="2024-02-12T19:15:40.453945347Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:15:40.454050 env[1378]: time="2024-02-12T19:15:40.453980468Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:15:40.454138 env[1378]: time="2024-02-12T19:15:40.454115632Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:15:40.454240 env[1378]: time="2024-02-12T19:15:40.454219475Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:15:40.454538 env[1378]: time="2024-02-12T19:15:40.454514083Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:15:40.454588 env[1378]: time="2024-02-12T19:15:40.454553924Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454588 env[1378]: time="2024-02-12T19:15:40.454573644Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:15:40.454640 env[1378]: time="2024-02-12T19:15:40.454622526Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454640 env[1378]: time="2024-02-12T19:15:40.454636406Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454679 env[1378]: time="2024-02-12T19:15:40.454648887Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454679 env[1378]: time="2024-02-12T19:15:40.454660687Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454742 env[1378]: time="2024-02-12T19:15:40.454721288Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454770 env[1378]: time="2024-02-12T19:15:40.454740849Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454770 env[1378]: time="2024-02-12T19:15:40.454753169Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454770 env[1378]: time="2024-02-12T19:15:40.454764450Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454851 env[1378]: time="2024-02-12T19:15:40.454779090Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:15:40.454921 env[1378]: time="2024-02-12T19:15:40.454898933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454967 env[1378]: time="2024-02-12T19:15:40.454920574Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454967 env[1378]: time="2024-02-12T19:15:40.454932814Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.454967 env[1378]: time="2024-02-12T19:15:40.454944215Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:15:40.454967 env[1378]: time="2024-02-12T19:15:40.454959215Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:15:40.455051 env[1378]: time="2024-02-12T19:15:40.454970455Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:15:40.455051 env[1378]: time="2024-02-12T19:15:40.454988456Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:15:40.455051 env[1378]: time="2024-02-12T19:15:40.455022417Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:15:40.455263 env[1378]: time="2024-02-12T19:15:40.455210742Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.455266943Z" level=info msg="Connect containerd service" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.455296144Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.456633300Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.456746343Z" level=info msg="Start subscribing containerd event" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.456782784Z" level=info msg="Start recovering state" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.456839106Z" level=info msg="Start event monitor" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.456855266Z" level=info msg="Start snapshots syncer" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.456863667Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.456871227Z" level=info msg="Start streaming server" Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.457157274Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:15:40.475398 env[1378]: time="2024-02-12T19:15:40.457200916Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:15:40.475691 tar[1374]: ./ Feb 12 19:15:40.475691 tar[1374]: ./macvlan Feb 12 19:15:40.457329 systemd[1]: Started containerd.service. Feb 12 19:15:40.478185 tar[1375]: crictl Feb 12 19:15:40.479401 env[1378]: time="2024-02-12T19:15:40.478473652Z" level=info msg="containerd successfully booted in 0.097000s" Feb 12 19:15:40.479483 tar[1376]: linux-arm64/helm Feb 12 19:15:40.495340 bash[1405]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:15:40.496121 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:15:40.546215 tar[1374]: ./static Feb 12 19:15:40.595146 tar[1374]: ./vlan Feb 12 19:15:40.636572 tar[1374]: ./portmap Feb 12 19:15:40.660523 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:15:40.667071 dbus-daemon[1351]: [system] SELinux support is enabled Feb 12 19:15:40.667227 systemd[1]: Started dbus.service. Feb 12 19:15:40.672988 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:15:40.673019 systemd[1]: Reached target system-config.target. Feb 12 19:15:40.682530 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:15:40.682555 systemd[1]: Reached target user-config.target. Feb 12 19:15:40.684760 tar[1374]: ./host-local Feb 12 19:15:40.691538 systemd[1]: Started systemd-logind.service. Feb 12 19:15:40.696684 dbus-daemon[1351]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 19:15:40.737400 tar[1374]: ./vrf Feb 12 19:15:40.797200 tar[1374]: ./bridge Feb 12 19:15:40.862300 tar[1374]: ./tuning Feb 12 19:15:40.928035 tar[1374]: ./firewall Feb 12 19:15:41.002345 tar[1374]: ./host-device Feb 12 19:15:41.069790 tar[1374]: ./sbr Feb 12 19:15:41.070064 update_engine[1371]: I0212 19:15:41.052568 1371 main.cc:92] Flatcar Update Engine starting Feb 12 19:15:41.124075 systemd[1]: Started update-engine.service. Feb 12 19:15:41.124500 update_engine[1371]: I0212 19:15:41.124118 1371 update_check_scheduler.cc:74] Next update check in 11m42s Feb 12 19:15:41.133738 systemd[1]: Started locksmithd.service. Feb 12 19:15:41.134643 tar[1374]: ./loopback Feb 12 19:15:41.203431 tar[1374]: ./dhcp Feb 12 19:15:41.306376 tar[1376]: linux-arm64/LICENSE Feb 12 19:15:41.306376 tar[1376]: linux-arm64/README.md Feb 12 19:15:41.311796 systemd[1]: Finished prepare-helm.service. Feb 12 19:15:41.362008 tar[1374]: ./ptp Feb 12 19:15:41.364909 systemd[1]: Finished prepare-critools.service. Feb 12 19:15:41.395635 tar[1374]: ./ipvlan Feb 12 19:15:41.427388 tar[1374]: ./bandwidth Feb 12 19:15:41.559085 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:15:42.539923 sshd_keygen[1370]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:15:42.557875 systemd[1]: Finished sshd-keygen.service. Feb 12 19:15:42.564252 systemd[1]: Starting issuegen.service... Feb 12 19:15:42.570041 systemd[1]: Started waagent.service. Feb 12 19:15:42.576490 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:15:42.576666 systemd[1]: Finished issuegen.service. Feb 12 19:15:42.583263 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:15:42.590442 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:15:42.598687 systemd[1]: Started getty@tty1.service. Feb 12 19:15:42.607909 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:15:42.614245 systemd[1]: Reached target getty.target. Feb 12 19:15:42.618857 systemd[1]: Reached target multi-user.target. Feb 12 19:15:42.625795 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:15:42.638256 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:15:42.638427 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:15:42.644103 systemd[1]: Startup finished in 781ms (kernel) + 18.500s (initrd) + 26.053s (userspace) = 45.335s. Feb 12 19:15:42.859343 locksmithd[1459]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:15:43.362945 login[1482]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 19:15:43.363624 login[1481]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:15:43.401754 systemd[1]: Created slice user-500.slice. Feb 12 19:15:43.402867 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:15:43.406610 systemd-logind[1369]: New session 2 of user core. Feb 12 19:15:43.443274 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:15:43.444675 systemd[1]: Starting user@500.service... Feb 12 19:15:43.481319 (systemd)[1485]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:15:43.782785 systemd[1485]: Queued start job for default target default.target. Feb 12 19:15:43.783280 systemd[1485]: Reached target paths.target. Feb 12 19:15:43.783303 systemd[1485]: Reached target sockets.target. Feb 12 19:15:43.783314 systemd[1485]: Reached target timers.target. Feb 12 19:15:43.783323 systemd[1485]: Reached target basic.target. Feb 12 19:15:43.783371 systemd[1485]: Reached target default.target. Feb 12 19:15:43.783394 systemd[1485]: Startup finished in 294ms. Feb 12 19:15:43.783460 systemd[1]: Started user@500.service. Feb 12 19:15:43.784339 systemd[1]: Started session-2.scope. Feb 12 19:15:44.364459 login[1482]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:15:44.368118 systemd-logind[1369]: New session 1 of user core. Feb 12 19:15:44.368569 systemd[1]: Started session-1.scope. Feb 12 19:15:50.197096 waagent[1479]: 2024-02-12T19:15:50.196992Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:15:50.204761 waagent[1479]: 2024-02-12T19:15:50.204674Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:15:50.210726 waagent[1479]: 2024-02-12T19:15:50.210649Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:15:50.218604 waagent[1479]: 2024-02-12T19:15:50.218506Z INFO Daemon Daemon Run daemon Feb 12 19:15:50.223895 waagent[1479]: 2024-02-12T19:15:50.223819Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:15:50.242350 waagent[1479]: 2024-02-12T19:15:50.242217Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:15:50.258402 waagent[1479]: 2024-02-12T19:15:50.258263Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:15:50.269624 waagent[1479]: 2024-02-12T19:15:50.269541Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:15:50.275535 waagent[1479]: 2024-02-12T19:15:50.275458Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:15:50.282577 waagent[1479]: 2024-02-12T19:15:50.282509Z INFO Daemon Daemon Activate resource disk Feb 12 19:15:50.287984 waagent[1479]: 2024-02-12T19:15:50.287916Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:15:50.303296 waagent[1479]: 2024-02-12T19:15:50.303217Z INFO Daemon Daemon Found device: None Feb 12 19:15:50.308609 waagent[1479]: 2024-02-12T19:15:50.308533Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:15:50.318393 waagent[1479]: 2024-02-12T19:15:50.318321Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:15:50.331295 waagent[1479]: 2024-02-12T19:15:50.331226Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:15:50.337919 waagent[1479]: 2024-02-12T19:15:50.337842Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:15:50.351772 waagent[1479]: 2024-02-12T19:15:50.351639Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:15:50.369140 waagent[1479]: 2024-02-12T19:15:50.369002Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:15:50.379559 waagent[1479]: 2024-02-12T19:15:50.379473Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:15:50.385319 waagent[1479]: 2024-02-12T19:15:50.385235Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:15:50.468723 waagent[1479]: 2024-02-12T19:15:50.468528Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:15:50.625236 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:15:50.646870 waagent[1479]: 2024-02-12T19:15:50.646729Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:15:50.653482 waagent[1479]: 2024-02-12T19:15:50.653368Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:15:50.661157 waagent[1479]: 2024-02-12T19:15:50.661068Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:15:50.669396 waagent[1479]: 2024-02-12T19:15:50.669308Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:15:50.676487 waagent[1479]: 2024-02-12T19:15:50.676386Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:15:50.682949 waagent[1479]: 2024-02-12T19:15:50.682869Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:15:50.844312 waagent[1479]: 2024-02-12T19:15:50.844180Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:15:50.853086 waagent[1479]: 2024-02-12T19:15:50.853038Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:15:50.859651 waagent[1479]: 2024-02-12T19:15:50.859577Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:15:52.203588 waagent[1479]: 2024-02-12T19:15:52.203438Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:15:52.219635 waagent[1479]: 2024-02-12T19:15:52.219560Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:15:52.227132 waagent[1479]: 2024-02-12T19:15:52.227057Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:15:52.303689 waagent[1479]: 2024-02-12T19:15:52.303547Z INFO Daemon Daemon Found private key matching thumbprint 6A03189609D04BE1504687A991440C8FB69D0875 Feb 12 19:15:52.312564 waagent[1479]: 2024-02-12T19:15:52.312482Z INFO Daemon Daemon Certificate with thumbprint F4DA7DA58A5C4D01D14F9D1976F20004C88F2F2C has no matching private key. Feb 12 19:15:52.322982 waagent[1479]: 2024-02-12T19:15:52.322903Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:15:52.350349 waagent[1479]: 2024-02-12T19:15:52.350293Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: f9fae04b-3a6d-47a3-a0a4-7b15c5fb449d New eTag: 17916501983478711072] Feb 12 19:15:52.361640 waagent[1479]: 2024-02-12T19:15:52.361557Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:15:52.380997 waagent[1479]: 2024-02-12T19:15:52.380935Z INFO Daemon Daemon Starting provisioning Feb 12 19:15:52.388210 waagent[1479]: 2024-02-12T19:15:52.388126Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:15:52.394333 waagent[1479]: 2024-02-12T19:15:52.394266Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-f1f3323662] Feb 12 19:15:52.441988 waagent[1479]: 2024-02-12T19:15:52.441852Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-f1f3323662] Feb 12 19:15:52.448853 waagent[1479]: 2024-02-12T19:15:52.448768Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:15:52.455741 waagent[1479]: 2024-02-12T19:15:52.455639Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:15:52.472014 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:15:52.472178 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:15:52.472229 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:15:52.472503 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:15:52.477464 systemd-networkd[1246]: eth0: DHCPv6 lease lost Feb 12 19:15:52.479120 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:15:52.479277 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:15:52.481187 systemd[1]: Starting systemd-networkd.service... Feb 12 19:15:52.508726 systemd-networkd[1532]: enP1235s1: Link UP Feb 12 19:15:52.508735 systemd-networkd[1532]: enP1235s1: Gained carrier Feb 12 19:15:52.509600 systemd-networkd[1532]: eth0: Link UP Feb 12 19:15:52.509610 systemd-networkd[1532]: eth0: Gained carrier Feb 12 19:15:52.509909 systemd-networkd[1532]: lo: Link UP Feb 12 19:15:52.509918 systemd-networkd[1532]: lo: Gained carrier Feb 12 19:15:52.510143 systemd-networkd[1532]: eth0: Gained IPv6LL Feb 12 19:15:52.511390 systemd-networkd[1532]: Enumeration completed Feb 12 19:15:52.511517 systemd[1]: Started systemd-networkd.service. Feb 12 19:15:52.513215 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:15:52.514520 systemd-networkd[1532]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:15:52.516657 waagent[1479]: 2024-02-12T19:15:52.516258Z INFO Daemon Daemon Create user account if not exists Feb 12 19:15:52.523308 waagent[1479]: 2024-02-12T19:15:52.523213Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:15:52.530664 waagent[1479]: 2024-02-12T19:15:52.530559Z INFO Daemon Daemon Configure sudoer Feb 12 19:15:52.535694 waagent[1479]: 2024-02-12T19:15:52.535624Z INFO Daemon Daemon Configure sshd Feb 12 19:15:52.539847 systemd-networkd[1532]: eth0: DHCPv4 address 10.200.20.36/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:15:52.541053 waagent[1479]: 2024-02-12T19:15:52.540981Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:15:52.542098 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:15:53.793952 waagent[1479]: 2024-02-12T19:15:53.793872Z INFO Daemon Daemon Provisioning complete Feb 12 19:15:53.816850 waagent[1479]: 2024-02-12T19:15:53.816786Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:15:53.823522 waagent[1479]: 2024-02-12T19:15:53.823446Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:15:53.834361 waagent[1479]: 2024-02-12T19:15:53.834286Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:15:54.130051 waagent[1541]: 2024-02-12T19:15:54.129901Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:15:54.130754 waagent[1541]: 2024-02-12T19:15:54.130699Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:15:54.130888 waagent[1541]: 2024-02-12T19:15:54.130842Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:15:54.143288 waagent[1541]: 2024-02-12T19:15:54.143207Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:15:54.143487 waagent[1541]: 2024-02-12T19:15:54.143438Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:15:54.212365 waagent[1541]: 2024-02-12T19:15:54.212220Z INFO ExtHandler ExtHandler Found private key matching thumbprint 6A03189609D04BE1504687A991440C8FB69D0875 Feb 12 19:15:54.212602 waagent[1541]: 2024-02-12T19:15:54.212546Z INFO ExtHandler ExtHandler Certificate with thumbprint F4DA7DA58A5C4D01D14F9D1976F20004C88F2F2C has no matching private key. Feb 12 19:15:54.212833 waagent[1541]: 2024-02-12T19:15:54.212785Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:15:54.226962 waagent[1541]: 2024-02-12T19:15:54.226907Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 453a6769-07eb-4863-9251-d479d1e0bd1e New eTag: 17916501983478711072] Feb 12 19:15:54.227624 waagent[1541]: 2024-02-12T19:15:54.227565Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:15:54.317555 waagent[1541]: 2024-02-12T19:15:54.317394Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:15:54.347749 waagent[1541]: 2024-02-12T19:15:54.347663Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1541 Feb 12 19:15:54.351510 waagent[1541]: 2024-02-12T19:15:54.351437Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:15:54.352852 waagent[1541]: 2024-02-12T19:15:54.352789Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:15:54.486120 waagent[1541]: 2024-02-12T19:15:54.486050Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:15:54.486566 waagent[1541]: 2024-02-12T19:15:54.486508Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:15:54.494308 waagent[1541]: 2024-02-12T19:15:54.494243Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:15:54.494809 waagent[1541]: 2024-02-12T19:15:54.494753Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:15:54.495948 waagent[1541]: 2024-02-12T19:15:54.495879Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:15:54.497277 waagent[1541]: 2024-02-12T19:15:54.497208Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:15:54.497929 waagent[1541]: 2024-02-12T19:15:54.497870Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:15:54.498195 waagent[1541]: 2024-02-12T19:15:54.498143Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:15:54.498881 waagent[1541]: 2024-02-12T19:15:54.498818Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:15:54.499553 waagent[1541]: 2024-02-12T19:15:54.499482Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:15:54.500226 waagent[1541]: 2024-02-12T19:15:54.500158Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:15:54.500490 waagent[1541]: 2024-02-12T19:15:54.500416Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:15:54.500490 waagent[1541]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:15:54.500490 waagent[1541]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:15:54.500490 waagent[1541]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:15:54.500490 waagent[1541]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:15:54.500490 waagent[1541]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:15:54.500490 waagent[1541]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:15:54.501027 waagent[1541]: 2024-02-12T19:15:54.500881Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:15:54.501086 waagent[1541]: 2024-02-12T19:15:54.501034Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:15:54.501464 waagent[1541]: 2024-02-12T19:15:54.501381Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:15:54.504198 waagent[1541]: 2024-02-12T19:15:54.504068Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:15:54.505083 waagent[1541]: 2024-02-12T19:15:54.505000Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:15:54.505487 waagent[1541]: 2024-02-12T19:15:54.505421Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:15:54.505700 waagent[1541]: 2024-02-12T19:15:54.505639Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:15:54.505802 waagent[1541]: 2024-02-12T19:15:54.505739Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:15:54.507702 waagent[1541]: 2024-02-12T19:15:54.507625Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:15:54.519196 waagent[1541]: 2024-02-12T19:15:54.519126Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:15:54.520659 waagent[1541]: 2024-02-12T19:15:54.520604Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:15:54.521605 waagent[1541]: 2024-02-12T19:15:54.521548Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:15:54.549957 waagent[1541]: 2024-02-12T19:15:54.549866Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1532' Feb 12 19:15:54.558380 waagent[1541]: 2024-02-12T19:15:54.558317Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:15:54.660689 waagent[1541]: 2024-02-12T19:15:54.660561Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:15:54.660689 waagent[1541]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:15:54.660689 waagent[1541]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:15:54.660689 waagent[1541]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:a1:f8 brd ff:ff:ff:ff:ff:ff Feb 12 19:15:54.660689 waagent[1541]: 3: enP1235s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:a1:f8 brd ff:ff:ff:ff:ff:ff\ altname enP1235p0s2 Feb 12 19:15:54.660689 waagent[1541]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:15:54.660689 waagent[1541]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:15:54.660689 waagent[1541]: 2: eth0 inet 10.200.20.36/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:15:54.660689 waagent[1541]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:15:54.660689 waagent[1541]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:15:54.660689 waagent[1541]: 2: eth0 inet6 fe80::222:48ff:feb7:a1f8/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:15:54.710232 waagent[1541]: 2024-02-12T19:15:54.710167Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:15:54.837953 waagent[1479]: 2024-02-12T19:15:54.837784Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:15:54.841878 waagent[1479]: 2024-02-12T19:15:54.841823Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:15:56.016047 waagent[1570]: 2024-02-12T19:15:56.015943Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:15:56.018785 waagent[1570]: 2024-02-12T19:15:56.018709Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:15:56.019041 waagent[1570]: 2024-02-12T19:15:56.018993Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:15:56.027253 waagent[1570]: 2024-02-12T19:15:56.027141Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:15:56.027838 waagent[1570]: 2024-02-12T19:15:56.027784Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:15:56.028085 waagent[1570]: 2024-02-12T19:15:56.028037Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:15:56.040807 waagent[1570]: 2024-02-12T19:15:56.040731Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:15:56.049815 waagent[1570]: 2024-02-12T19:15:56.049753Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:15:56.051044 waagent[1570]: 2024-02-12T19:15:56.050988Z INFO ExtHandler Feb 12 19:15:56.051303 waagent[1570]: 2024-02-12T19:15:56.051254Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 92ad937d-2aa8-413b-bd78-c1fc04f811bd eTag: 17916501983478711072 source: Fabric] Feb 12 19:15:56.052143 waagent[1570]: 2024-02-12T19:15:56.052089Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:15:56.053451 waagent[1570]: 2024-02-12T19:15:56.053379Z INFO ExtHandler Feb 12 19:15:56.053675 waagent[1570]: 2024-02-12T19:15:56.053628Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:15:56.060337 waagent[1570]: 2024-02-12T19:15:56.060290Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:15:56.060930 waagent[1570]: 2024-02-12T19:15:56.060886Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:15:56.091628 waagent[1570]: 2024-02-12T19:15:56.091565Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:15:56.170286 waagent[1570]: 2024-02-12T19:15:56.170146Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F4DA7DA58A5C4D01D14F9D1976F20004C88F2F2C', 'hasPrivateKey': False} Feb 12 19:15:56.171582 waagent[1570]: 2024-02-12T19:15:56.171521Z INFO ExtHandler Downloaded certificate {'thumbprint': '6A03189609D04BE1504687A991440C8FB69D0875', 'hasPrivateKey': True} Feb 12 19:15:56.172732 waagent[1570]: 2024-02-12T19:15:56.172674Z INFO ExtHandler Fetch goal state completed Feb 12 19:15:56.204561 waagent[1570]: 2024-02-12T19:15:56.204482Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1570 Feb 12 19:15:56.208219 waagent[1570]: 2024-02-12T19:15:56.208152Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:15:56.209824 waagent[1570]: 2024-02-12T19:15:56.209766Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:15:56.214879 waagent[1570]: 2024-02-12T19:15:56.214828Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:15:56.215385 waagent[1570]: 2024-02-12T19:15:56.215331Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:15:56.223378 waagent[1570]: 2024-02-12T19:15:56.223318Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:15:56.224115 waagent[1570]: 2024-02-12T19:15:56.224060Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:15:56.230497 waagent[1570]: 2024-02-12T19:15:56.230364Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 12 19:15:56.234325 waagent[1570]: 2024-02-12T19:15:56.234267Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:15:56.236161 waagent[1570]: 2024-02-12T19:15:56.236093Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:15:56.236493 waagent[1570]: 2024-02-12T19:15:56.236403Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:15:56.237360 waagent[1570]: 2024-02-12T19:15:56.237281Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:15:56.237615 waagent[1570]: 2024-02-12T19:15:56.237545Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:15:56.238251 waagent[1570]: 2024-02-12T19:15:56.238183Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:15:56.238973 waagent[1570]: 2024-02-12T19:15:56.238897Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:15:56.238973 waagent[1570]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:15:56.238973 waagent[1570]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:15:56.238973 waagent[1570]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:15:56.238973 waagent[1570]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:15:56.238973 waagent[1570]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:15:56.238973 waagent[1570]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:15:56.241106 waagent[1570]: 2024-02-12T19:15:56.240942Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:15:56.241335 waagent[1570]: 2024-02-12T19:15:56.241273Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:15:56.241871 waagent[1570]: 2024-02-12T19:15:56.241800Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:15:56.242006 waagent[1570]: 2024-02-12T19:15:56.241956Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:15:56.242118 waagent[1570]: 2024-02-12T19:15:56.242076Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:15:56.242649 waagent[1570]: 2024-02-12T19:15:56.242577Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:15:56.243093 waagent[1570]: 2024-02-12T19:15:56.243023Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:15:56.246658 waagent[1570]: 2024-02-12T19:15:56.246517Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:15:56.246878 waagent[1570]: 2024-02-12T19:15:56.246806Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:15:56.249748 waagent[1570]: 2024-02-12T19:15:56.249576Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:15:56.264095 waagent[1570]: 2024-02-12T19:15:56.263999Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:15:56.266528 waagent[1570]: 2024-02-12T19:15:56.266396Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:15:56.271380 waagent[1570]: 2024-02-12T19:15:56.271307Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:15:56.271380 waagent[1570]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:15:56.271380 waagent[1570]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:15:56.271380 waagent[1570]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:a1:f8 brd ff:ff:ff:ff:ff:ff Feb 12 19:15:56.271380 waagent[1570]: 3: enP1235s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:b7:a1:f8 brd ff:ff:ff:ff:ff:ff\ altname enP1235p0s2 Feb 12 19:15:56.271380 waagent[1570]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:15:56.271380 waagent[1570]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:15:56.271380 waagent[1570]: 2: eth0 inet 10.200.20.36/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:15:56.271380 waagent[1570]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:15:56.271380 waagent[1570]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:15:56.271380 waagent[1570]: 2: eth0 inet6 fe80::222:48ff:feb7:a1f8/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:15:56.294009 waagent[1570]: 2024-02-12T19:15:56.293944Z INFO ExtHandler ExtHandler Feb 12 19:15:56.295684 waagent[1570]: 2024-02-12T19:15:56.295605Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 8203249d-ebd3-4085-b8e9-ac9d7299e418 correlation e7d7b5bd-c1c9-47f9-8d0a-f669f6f8faa2 created: 2024-02-12T19:14:04.413979Z] Feb 12 19:15:56.296978 waagent[1570]: 2024-02-12T19:15:56.296917Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:15:56.298882 waagent[1570]: 2024-02-12T19:15:56.298828Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 4 ms] Feb 12 19:15:56.324110 waagent[1570]: 2024-02-12T19:15:56.324037Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:15:56.341048 waagent[1570]: 2024-02-12T19:15:56.340972Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 1CC6A0F8-ADFF-4145-924A-4B26294A7208;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:15:56.519627 waagent[1570]: 2024-02-12T19:15:56.519441Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 12 19:15:56.519627 waagent[1570]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:15:56.519627 waagent[1570]: pkts bytes target prot opt in out source destination Feb 12 19:15:56.519627 waagent[1570]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:15:56.519627 waagent[1570]: pkts bytes target prot opt in out source destination Feb 12 19:15:56.519627 waagent[1570]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:15:56.519627 waagent[1570]: pkts bytes target prot opt in out source destination Feb 12 19:15:56.519627 waagent[1570]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:15:56.519627 waagent[1570]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:15:56.519627 waagent[1570]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:15:56.526964 waagent[1570]: 2024-02-12T19:15:56.526832Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:15:56.526964 waagent[1570]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:15:56.526964 waagent[1570]: pkts bytes target prot opt in out source destination Feb 12 19:15:56.526964 waagent[1570]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:15:56.526964 waagent[1570]: pkts bytes target prot opt in out source destination Feb 12 19:15:56.526964 waagent[1570]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:15:56.526964 waagent[1570]: pkts bytes target prot opt in out source destination Feb 12 19:15:56.526964 waagent[1570]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:15:56.526964 waagent[1570]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:15:56.526964 waagent[1570]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:15:56.527529 waagent[1570]: 2024-02-12T19:15:56.527473Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:16:18.150703 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 12 19:16:26.317451 update_engine[1371]: I0212 19:16:26.317396 1371 update_attempter.cc:509] Updating boot flags... Feb 12 19:16:41.423745 systemd[1]: Created slice system-sshd.slice. Feb 12 19:16:41.424813 systemd[1]: Started sshd@0-10.200.20.36:22-10.200.12.6:51360.service. Feb 12 19:16:42.065369 sshd[1689]: Accepted publickey for core from 10.200.12.6 port 51360 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:42.085913 sshd[1689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:42.090208 systemd[1]: Started session-3.scope. Feb 12 19:16:42.090511 systemd-logind[1369]: New session 3 of user core. Feb 12 19:16:42.422231 systemd[1]: Started sshd@1-10.200.20.36:22-10.200.12.6:51372.service. Feb 12 19:16:42.833012 sshd[1694]: Accepted publickey for core from 10.200.12.6 port 51372 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:42.834550 sshd[1694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:42.838006 systemd-logind[1369]: New session 4 of user core. Feb 12 19:16:42.838456 systemd[1]: Started session-4.scope. Feb 12 19:16:43.125370 sshd[1694]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:43.127794 systemd-logind[1369]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:16:43.128036 systemd[1]: sshd@1-10.200.20.36:22-10.200.12.6:51372.service: Deactivated successfully. Feb 12 19:16:43.128680 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:16:43.129302 systemd-logind[1369]: Removed session 4. Feb 12 19:16:43.199167 systemd[1]: Started sshd@2-10.200.20.36:22-10.200.12.6:51382.service. Feb 12 19:16:43.595075 sshd[1700]: Accepted publickey for core from 10.200.12.6 port 51382 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:43.596637 sshd[1700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:43.600151 systemd-logind[1369]: New session 5 of user core. Feb 12 19:16:43.600590 systemd[1]: Started session-5.scope. Feb 12 19:16:43.882043 sshd[1700]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:43.884213 systemd[1]: sshd@2-10.200.20.36:22-10.200.12.6:51382.service: Deactivated successfully. Feb 12 19:16:43.884897 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:16:43.885373 systemd-logind[1369]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:16:43.886142 systemd-logind[1369]: Removed session 5. Feb 12 19:16:43.948628 systemd[1]: Started sshd@3-10.200.20.36:22-10.200.12.6:51394.service. Feb 12 19:16:44.344782 sshd[1706]: Accepted publickey for core from 10.200.12.6 port 51394 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:44.345972 sshd[1706]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:44.349947 systemd[1]: Started session-6.scope. Feb 12 19:16:44.350234 systemd-logind[1369]: New session 6 of user core. Feb 12 19:16:44.636175 sshd[1706]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:44.638639 systemd[1]: sshd@3-10.200.20.36:22-10.200.12.6:51394.service: Deactivated successfully. Feb 12 19:16:44.639274 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:16:44.639796 systemd-logind[1369]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:16:44.640595 systemd-logind[1369]: Removed session 6. Feb 12 19:16:44.704078 systemd[1]: Started sshd@4-10.200.20.36:22-10.200.12.6:51398.service. Feb 12 19:16:45.106422 sshd[1712]: Accepted publickey for core from 10.200.12.6 port 51398 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:45.107624 sshd[1712]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:45.111200 systemd-logind[1369]: New session 7 of user core. Feb 12 19:16:45.111628 systemd[1]: Started session-7.scope. Feb 12 19:16:45.629829 sudo[1715]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:16:45.630027 sudo[1715]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:16:45.685593 dbus-daemon[1351]: avc: received setenforce notice (enforcing=1) Feb 12 19:16:45.687356 sudo[1715]: pam_unix(sudo:session): session closed for user root Feb 12 19:16:45.769802 sshd[1712]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:45.772417 systemd[1]: sshd@4-10.200.20.36:22-10.200.12.6:51398.service: Deactivated successfully. Feb 12 19:16:45.773177 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:16:45.773740 systemd-logind[1369]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:16:45.774708 systemd-logind[1369]: Removed session 7. Feb 12 19:16:45.837993 systemd[1]: Started sshd@5-10.200.20.36:22-10.200.12.6:51408.service. Feb 12 19:16:46.242101 sshd[1719]: Accepted publickey for core from 10.200.12.6 port 51408 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:46.243696 sshd[1719]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:46.247585 systemd[1]: Started session-8.scope. Feb 12 19:16:46.248070 systemd-logind[1369]: New session 8 of user core. Feb 12 19:16:46.474807 sudo[1723]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:16:46.475281 sudo[1723]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:16:46.477847 sudo[1723]: pam_unix(sudo:session): session closed for user root Feb 12 19:16:46.481748 sudo[1722]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:16:46.481933 sudo[1722]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:16:46.489640 systemd[1]: Stopping audit-rules.service... Feb 12 19:16:46.490000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:16:46.491637 auditctl[1726]: No rules Feb 12 19:16:46.494412 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:16:46.494467 kernel: audit: type=1305 audit(1707765406.490:167): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:16:46.495188 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:16:46.495341 systemd[1]: Stopped audit-rules.service. Feb 12 19:16:46.496758 systemd[1]: Starting audit-rules.service... Feb 12 19:16:46.490000 audit[1726]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff968c850 a2=420 a3=0 items=0 ppid=1 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:46.515369 augenrules[1743]: No rules Feb 12 19:16:46.516258 systemd[1]: Finished audit-rules.service. Feb 12 19:16:46.527277 kernel: audit: type=1300 audit(1707765406.490:167): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffff968c850 a2=420 a3=0 items=0 ppid=1 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:46.527464 sudo[1722]: pam_unix(sudo:session): session closed for user root Feb 12 19:16:46.490000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:16:46.534734 kernel: audit: type=1327 audit(1707765406.490:167): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:16:46.534792 kernel: audit: type=1131 audit(1707765406.494:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.494000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.516000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.565953 kernel: audit: type=1130 audit(1707765406.516:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.527000 audit[1722]: USER_END pid=1722 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.583668 kernel: audit: type=1106 audit(1707765406.527:170): pid=1722 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.583745 kernel: audit: type=1104 audit(1707765406.527:171): pid=1722 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.527000 audit[1722]: CRED_DISP pid=1722 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.600236 sshd[1719]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:46.600000 audit[1719]: USER_END pid=1719 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:46.624481 systemd[1]: sshd@5-10.200.20.36:22-10.200.12.6:51408.service: Deactivated successfully. Feb 12 19:16:46.601000 audit[1719]: CRED_DISP pid=1719 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:46.643859 kernel: audit: type=1106 audit(1707765406.600:172): pid=1719 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:46.643950 kernel: audit: type=1104 audit(1707765406.601:173): pid=1719 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:46.625187 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:16:46.624000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.36:22-10.200.12.6:51408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.644573 systemd-logind[1369]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:16:46.663451 kernel: audit: type=1131 audit(1707765406.624:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.36:22-10.200.12.6:51408 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:46.666144 systemd-logind[1369]: Removed session 8. Feb 12 19:16:46.666827 systemd[1]: Started sshd@6-10.200.20.36:22-10.200.12.6:51412.service. Feb 12 19:16:46.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.36:22-10.200.12.6:51412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:47.068000 audit[1749]: USER_ACCT pid=1749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:47.069128 sshd[1749]: Accepted publickey for core from 10.200.12.6 port 51412 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:47.069000 audit[1749]: CRED_ACQ pid=1749 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:47.069000 audit[1749]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd3ceecc0 a2=3 a3=1 items=0 ppid=1 pid=1749 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:47.069000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:16:47.070682 sshd[1749]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:47.074443 systemd-logind[1369]: New session 9 of user core. Feb 12 19:16:47.074896 systemd[1]: Started session-9.scope. Feb 12 19:16:47.078000 audit[1749]: USER_START pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:47.079000 audit[1751]: CRED_ACQ pid=1751 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:47.299000 audit[1752]: USER_ACCT pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:47.300470 sudo[1752]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:16:47.300000 audit[1752]: CRED_REFR pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:47.300668 sudo[1752]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:16:47.301000 audit[1752]: USER_START pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:47.997453 systemd[1]: Starting docker.service... Feb 12 19:16:48.054656 env[1767]: time="2024-02-12T19:16:48.054607451Z" level=info msg="Starting up" Feb 12 19:16:48.064671 env[1767]: time="2024-02-12T19:16:48.064632638Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:16:48.064671 env[1767]: time="2024-02-12T19:16:48.064663677Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:16:48.064799 env[1767]: time="2024-02-12T19:16:48.064686557Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:16:48.064799 env[1767]: time="2024-02-12T19:16:48.064698637Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:16:48.066530 env[1767]: time="2024-02-12T19:16:48.066500940Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:16:48.066530 env[1767]: time="2024-02-12T19:16:48.066524980Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:16:48.066641 env[1767]: time="2024-02-12T19:16:48.066540260Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:16:48.066641 env[1767]: time="2024-02-12T19:16:48.066549900Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:16:48.225152 env[1767]: time="2024-02-12T19:16:48.225118901Z" level=info msg="Loading containers: start." Feb 12 19:16:48.292000 audit[1795]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.292000 audit[1795]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=fffff803d4d0 a2=0 a3=1 items=0 ppid=1767 pid=1795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.292000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:16:48.294000 audit[1797]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1797 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.294000 audit[1797]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffeab89040 a2=0 a3=1 items=0 ppid=1767 pid=1797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.294000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:16:48.295000 audit[1799]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1799 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.295000 audit[1799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd559d0b0 a2=0 a3=1 items=0 ppid=1767 pid=1799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.295000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:16:48.297000 audit[1801]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1801 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.297000 audit[1801]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=fffffda40c40 a2=0 a3=1 items=0 ppid=1767 pid=1801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.297000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:16:48.299000 audit[1803]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.299000 audit[1803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc50607e0 a2=0 a3=1 items=0 ppid=1767 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.299000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:16:48.300000 audit[1805]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1805 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.300000 audit[1805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff781e3b0 a2=0 a3=1 items=0 ppid=1767 pid=1805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.300000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:16:48.315000 audit[1807]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1807 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.315000 audit[1807]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffffa22bc80 a2=0 a3=1 items=0 ppid=1767 pid=1807 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.315000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:16:48.317000 audit[1809]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.317000 audit[1809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffd5a971d0 a2=0 a3=1 items=0 ppid=1767 pid=1809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.317000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:16:48.318000 audit[1811]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1811 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.318000 audit[1811]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe08e2d60 a2=0 a3=1 items=0 ppid=1767 pid=1811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.318000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:48.333000 audit[1815]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1815 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.333000 audit[1815]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcea86e20 a2=0 a3=1 items=0 ppid=1767 pid=1815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.333000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:48.334000 audit[1816]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.334000 audit[1816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff4adca30 a2=0 a3=1 items=0 ppid=1767 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.334000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:48.378439 kernel: Initializing XFRM netlink socket Feb 12 19:16:48.402940 env[1767]: time="2024-02-12T19:16:48.402908002Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:16:48.650000 audit[1824]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.650000 audit[1824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffc43a82f0 a2=0 a3=1 items=0 ppid=1767 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.650000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:16:48.665000 audit[1827]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1827 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.665000 audit[1827]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd4bf1440 a2=0 a3=1 items=0 ppid=1767 pid=1827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.665000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:16:48.668000 audit[1830]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.668000 audit[1830]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc34c5c40 a2=0 a3=1 items=0 ppid=1767 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.668000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:16:48.669000 audit[1832]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.669000 audit[1832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=fffff414c580 a2=0 a3=1 items=0 ppid=1767 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.669000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:16:48.671000 audit[1834]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.671000 audit[1834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffee4efb40 a2=0 a3=1 items=0 ppid=1767 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.671000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:16:48.673000 audit[1836]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.673000 audit[1836]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=fffff3c61310 a2=0 a3=1 items=0 ppid=1767 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.673000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:16:48.674000 audit[1838]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.674000 audit[1838]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff508bdc0 a2=0 a3=1 items=0 ppid=1767 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:16:48.676000 audit[1840]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1840 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.676000 audit[1840]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffe2a2f960 a2=0 a3=1 items=0 ppid=1767 pid=1840 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.676000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:16:48.678000 audit[1842]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.678000 audit[1842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffe7408bc0 a2=0 a3=1 items=0 ppid=1767 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:16:48.679000 audit[1844]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1844 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.679000 audit[1844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffce921600 a2=0 a3=1 items=0 ppid=1767 pid=1844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:16:48.681000 audit[1846]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1846 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.681000 audit[1846]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffedb7c2b0 a2=0 a3=1 items=0 ppid=1767 pid=1846 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.681000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:16:48.683272 systemd-networkd[1532]: docker0: Link UP Feb 12 19:16:48.699000 audit[1850]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1850 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.699000 audit[1850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd05f98f0 a2=0 a3=1 items=0 ppid=1767 pid=1850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.699000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:48.700000 audit[1851]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1851 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:48.700000 audit[1851]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffe93c27b0 a2=0 a3=1 items=0 ppid=1767 pid=1851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.700000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:48.702576 env[1767]: time="2024-02-12T19:16:48.702551487Z" level=info msg="Loading containers: done." Feb 12 19:16:48.710659 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1151612173-merged.mount: Deactivated successfully. Feb 12 19:16:48.798091 env[1767]: time="2024-02-12T19:16:48.798050156Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:16:48.798518 env[1767]: time="2024-02-12T19:16:48.798494472Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:16:48.798710 env[1767]: time="2024-02-12T19:16:48.798696150Z" level=info msg="Daemon has completed initialization" Feb 12 19:16:48.826000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.828008 systemd[1]: Started docker.service. Feb 12 19:16:48.834232 env[1767]: time="2024-02-12T19:16:48.834168899Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:16:48.850215 systemd[1]: Reloading. Feb 12 19:16:48.904591 /usr/lib/systemd/system-generators/torcx-generator[1898]: time="2024-02-12T19:16:48Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:16:48.904920 /usr/lib/systemd/system-generators/torcx-generator[1898]: time="2024-02-12T19:16:48Z" level=info msg="torcx already run" Feb 12 19:16:48.985026 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:16:48.985047 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:16:49.002142 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:16:49.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.063000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.063000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit: BPF prog-id=32 op=LOAD Feb 12 19:16:49.064000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit: BPF prog-id=33 op=LOAD Feb 12 19:16:49.064000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit: BPF prog-id=34 op=LOAD Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.064000 audit: BPF prog-id=35 op=LOAD Feb 12 19:16:49.064000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:16:49.064000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.065000 audit: BPF prog-id=36 op=LOAD Feb 12 19:16:49.065000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit: BPF prog-id=37 op=LOAD Feb 12 19:16:49.066000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit: BPF prog-id=38 op=LOAD Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.066000 audit: BPF prog-id=39 op=LOAD Feb 12 19:16:49.066000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:16:49.066000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit: BPF prog-id=40 op=LOAD Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.068000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit: BPF prog-id=41 op=LOAD Feb 12 19:16:49.069000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:16:49.069000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.069000 audit: BPF prog-id=42 op=LOAD Feb 12 19:16:49.069000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit: BPF prog-id=43 op=LOAD Feb 12 19:16:49.071000 audit: BPF prog-id=26 op=UNLOAD Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit: BPF prog-id=44 op=LOAD Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.071000 audit: BPF prog-id=45 op=LOAD Feb 12 19:16:49.071000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:16:49.071000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:49.072000 audit: BPF prog-id=46 op=LOAD Feb 12 19:16:49.072000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:16:49.080704 systemd[1]: Started kubelet.service. Feb 12 19:16:49.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:49.146057 kubelet[1958]: E0212 19:16:49.145976 1958 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:16:49.148291 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:16:49.148442 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:16:49.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:16:53.866178 env[1378]: time="2024-02-12T19:16:53.866130163Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\"" Feb 12 19:16:54.694479 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4081663330.mount: Deactivated successfully. Feb 12 19:16:56.460741 env[1378]: time="2024-02-12T19:16:56.460689247Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:56.467195 env[1378]: time="2024-02-12T19:16:56.467155998Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:56.473764 env[1378]: time="2024-02-12T19:16:56.473716789Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:56.484357 env[1378]: time="2024-02-12T19:16:56.484304229Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2f28bed4096abd572a56595ac0304238bdc271dcfe22c650707c09bf97ec16fd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:56.484939 env[1378]: time="2024-02-12T19:16:56.484911024Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.26.13\" returns image reference \"sha256:d88fbf485621d26e515136c1848b666d7dfe0fa84ca7ebd826447b039d306d88\"" Feb 12 19:16:56.493919 env[1378]: time="2024-02-12T19:16:56.493886477Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\"" Feb 12 19:16:58.437773 env[1378]: time="2024-02-12T19:16:58.437652116Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:58.446059 env[1378]: time="2024-02-12T19:16:58.446014016Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:58.451708 env[1378]: time="2024-02-12T19:16:58.451673816Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:58.463535 env[1378]: time="2024-02-12T19:16:58.463494811Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fda420c6c15cdd01c4eba3404f0662fe486a9c7f38fa13c741a21334673841a2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:58.463985 env[1378]: time="2024-02-12T19:16:58.463960207Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.26.13\" returns image reference \"sha256:71d8e883014e0849ca9a3161bd1feac09ad210dea2f4140732e218f04a6826c2\"" Feb 12 19:16:58.473256 env[1378]: time="2024-02-12T19:16:58.473195781Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\"" Feb 12 19:16:59.194790 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:16:59.194965 systemd[1]: Stopped kubelet.service. Feb 12 19:16:59.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:59.196424 systemd[1]: Started kubelet.service. Feb 12 19:16:59.200237 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 12 19:16:59.200289 kernel: audit: type=1130 audit(1707765419.193:383): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:59.193000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:59.237485 kernel: audit: type=1131 audit(1707765419.193:384): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:59.237601 kernel: audit: type=1130 audit(1707765419.195:385): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:59.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:59.258807 kubelet[1987]: E0212 19:16:59.258742 1987 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:16:59.261789 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:16:59.260000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:16:59.261913 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:16:59.282422 kernel: audit: type=1131 audit(1707765419.260:386): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:16:59.824644 env[1378]: time="2024-02-12T19:16:59.824601549Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:59.848543 env[1378]: time="2024-02-12T19:16:59.848479462Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:59.853120 env[1378]: time="2024-02-12T19:16:59.853088550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:59.859115 env[1378]: time="2024-02-12T19:16:59.859088348Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:c3c7303ee6d01c8e5a769db28661cf854b55175aa72c67e9b6a7b9d47ac42af3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:59.859888 env[1378]: time="2024-02-12T19:16:59.859862062Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.26.13\" returns image reference \"sha256:a636f3d6300bad4775ea80ad544e38f486a039732c4871bddc1db3a5336c871a\"" Feb 12 19:16:59.868398 env[1378]: time="2024-02-12T19:16:59.868363563Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\"" Feb 12 19:17:01.030844 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount706170896.mount: Deactivated successfully. Feb 12 19:17:01.707518 env[1378]: time="2024-02-12T19:17:01.707462320Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:01.725675 env[1378]: time="2024-02-12T19:17:01.725627240Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:01.729695 env[1378]: time="2024-02-12T19:17:01.729663493Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.26.13,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:01.732480 env[1378]: time="2024-02-12T19:17:01.732453234Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:f6e0de32a002b910b9b2e0e8d769e2d7b05208240559c745ce4781082ab15f22,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:01.732948 env[1378]: time="2024-02-12T19:17:01.732921351Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.26.13\" returns image reference \"sha256:95874282cd4f2ad9bc384735e604f0380cff88d61a2ca9db65890e6d9df46926\"" Feb 12 19:17:01.740961 env[1378]: time="2024-02-12T19:17:01.740930178Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:17:02.403728 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2346458679.mount: Deactivated successfully. Feb 12 19:17:02.424681 env[1378]: time="2024-02-12T19:17:02.424629421Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:02.433025 env[1378]: time="2024-02-12T19:17:02.432990327Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:02.437509 env[1378]: time="2024-02-12T19:17:02.437469298Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:02.442604 env[1378]: time="2024-02-12T19:17:02.442577145Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:02.443051 env[1378]: time="2024-02-12T19:17:02.443026342Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 12 19:17:02.451298 env[1378]: time="2024-02-12T19:17:02.451269289Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\"" Feb 12 19:17:03.265348 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3032940615.mount: Deactivated successfully. Feb 12 19:17:06.372278 env[1378]: time="2024-02-12T19:17:06.372223415Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:06.382172 env[1378]: time="2024-02-12T19:17:06.382119757Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:06.387836 env[1378]: time="2024-02-12T19:17:06.387793204Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.6-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:06.394255 env[1378]: time="2024-02-12T19:17:06.394215846Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:dd75ec974b0a2a6f6bb47001ba09207976e625db898d1b16735528c009cb171c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:06.394985 env[1378]: time="2024-02-12T19:17:06.394957762Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.6-0\" returns image reference \"sha256:ef245802824036d4a23ba6f8b3f04c055416f9dc73a54d546b1f98ad16f6b8cb\"" Feb 12 19:17:06.404358 env[1378]: time="2024-02-12T19:17:06.404318106Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\"" Feb 12 19:17:07.177949 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3852809599.mount: Deactivated successfully. Feb 12 19:17:07.814397 env[1378]: time="2024-02-12T19:17:07.814339211Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:07.825674 env[1378]: time="2024-02-12T19:17:07.825629666Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:07.830817 env[1378]: time="2024-02-12T19:17:07.830786716Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.9.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:07.836571 env[1378]: time="2024-02-12T19:17:07.836529044Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:8e352a029d304ca7431c6507b56800636c321cb52289686a581ab70aaa8a2e2a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:07.837292 env[1378]: time="2024-02-12T19:17:07.837264559Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.9.3\" returns image reference \"sha256:b19406328e70dd2f6a36d6dbe4e867b0684ced2fdeb2f02ecb54ead39ec0bac0\"" Feb 12 19:17:09.444747 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 19:17:09.444925 systemd[1]: Stopped kubelet.service. Feb 12 19:17:09.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:09.446361 systemd[1]: Started kubelet.service. Feb 12 19:17:09.443000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:09.487393 kernel: audit: type=1130 audit(1707765429.443:387): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:09.487513 kernel: audit: type=1131 audit(1707765429.443:388): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:09.443000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:09.507383 kernel: audit: type=1130 audit(1707765429.443:389): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:09.535309 kubelet[2072]: E0212 19:17:09.535252 2072 run.go:74] "command failed" err="failed to validate kubelet flags: the container runtime endpoint address was not specified or empty, use --container-runtime-endpoint to set" Feb 12 19:17:09.537285 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:17:09.537441 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:17:09.536000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:17:09.558441 kernel: audit: type=1131 audit(1707765429.536:390): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:17:12.005235 systemd[1]: Stopped kubelet.service. Feb 12 19:17:12.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:12.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:12.046150 kernel: audit: type=1130 audit(1707765432.003:391): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:12.046247 kernel: audit: type=1131 audit(1707765432.003:392): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:12.055454 systemd[1]: Reloading. Feb 12 19:17:12.114475 /usr/lib/systemd/system-generators/torcx-generator[2102]: time="2024-02-12T19:17:12Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:17:12.117017 /usr/lib/systemd/system-generators/torcx-generator[2102]: time="2024-02-12T19:17:12Z" level=info msg="torcx already run" Feb 12 19:17:12.204895 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:17:12.204914 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:17:12.221835 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:17:12.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.323267 kernel: audit: type=1400 audit(1707765432.284:393): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.323372 kernel: audit: type=1400 audit(1707765432.284:394): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.323430 kernel: audit: type=1400 audit(1707765432.284:395): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.360598 kernel: audit: type=1400 audit(1707765432.284:396): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.284000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.284000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit: BPF prog-id=47 op=LOAD Feb 12 19:17:12.303000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.303000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.322000 audit: BPF prog-id=48 op=LOAD Feb 12 19:17:12.322000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:17:12.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.322000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.322000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.341000 audit: BPF prog-id=49 op=LOAD Feb 12 19:17:12.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.341000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.341000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.359000 audit: BPF prog-id=50 op=LOAD Feb 12 19:17:12.359000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:17:12.359000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.361000 audit: BPF prog-id=51 op=LOAD Feb 12 19:17:12.362000 audit: BPF prog-id=36 op=UNLOAD Feb 12 19:17:12.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.362000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.362000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit: BPF prog-id=52 op=LOAD Feb 12 19:17:12.363000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.363000 audit: BPF prog-id=53 op=LOAD Feb 12 19:17:12.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.364000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.364000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.364000 audit: BPF prog-id=54 op=LOAD Feb 12 19:17:12.364000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:17:12.364000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.366000 audit: BPF prog-id=55 op=LOAD Feb 12 19:17:12.366000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit: BPF prog-id=56 op=LOAD Feb 12 19:17:12.367000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:17:12.367000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.367000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.368000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.368000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.368000 audit: BPF prog-id=57 op=LOAD Feb 12 19:17:12.368000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.370000 audit: BPF prog-id=58 op=LOAD Feb 12 19:17:12.370000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit: BPF prog-id=59 op=LOAD Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.371000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit: BPF prog-id=60 op=LOAD Feb 12 19:17:12.372000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:17:12.372000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.372000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:12.373000 audit: BPF prog-id=61 op=LOAD Feb 12 19:17:12.373000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:17:12.399982 systemd[1]: Started kubelet.service. Feb 12 19:17:12.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:12.438930 kubelet[2161]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:17:12.438930 kubelet[2161]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:17:12.439261 kubelet[2161]: I0212 19:17:12.439009 2161 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:17:12.441225 kubelet[2161]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:17:12.441339 kubelet[2161]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:17:13.131684 kubelet[2161]: I0212 19:17:13.131656 2161 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 19:17:13.131842 kubelet[2161]: I0212 19:17:13.131830 2161 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:17:13.132118 kubelet[2161]: I0212 19:17:13.132104 2161 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 19:17:13.135204 kubelet[2161]: E0212 19:17:13.135165 2161 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.36:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.135319 kubelet[2161]: I0212 19:17:13.135213 2161 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:17:13.137033 kubelet[2161]: W0212 19:17:13.137019 2161 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:17:13.137662 kubelet[2161]: I0212 19:17:13.137635 2161 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:17:13.137950 kubelet[2161]: I0212 19:17:13.137938 2161 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:17:13.138085 kubelet[2161]: I0212 19:17:13.138073 2161 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:17:13.138215 kubelet[2161]: I0212 19:17:13.138203 2161 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:17:13.138275 kubelet[2161]: I0212 19:17:13.138267 2161 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 19:17:13.138455 kubelet[2161]: I0212 19:17:13.138442 2161 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:17:13.145065 kubelet[2161]: I0212 19:17:13.145038 2161 kubelet.go:398] "Attempting to sync node with API server" Feb 12 19:17:13.145065 kubelet[2161]: I0212 19:17:13.145067 2161 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:17:13.145176 kubelet[2161]: I0212 19:17:13.145095 2161 kubelet.go:297] "Adding apiserver pod source" Feb 12 19:17:13.145176 kubelet[2161]: I0212 19:17:13.145105 2161 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:17:13.145711 kubelet[2161]: I0212 19:17:13.145695 2161 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:17:13.146048 kubelet[2161]: W0212 19:17:13.146032 2161 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:17:13.146501 kubelet[2161]: I0212 19:17:13.146485 2161 server.go:1186] "Started kubelet" Feb 12 19:17:13.146000 audit[2161]: AVC avc: denied { mac_admin } for pid=2161 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:13.146000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:13.146000 audit[2161]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000bb32c0 a1=4000bb0ed0 a2=4000bb3290 a3=25 items=0 ppid=1 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.146000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:13.148313 kubelet[2161]: I0212 19:17:13.148296 2161 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:17:13.146000 audit[2161]: AVC avc: denied { mac_admin } for pid=2161 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:13.146000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:13.146000 audit[2161]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ba2fa0 a1=4000bb0ee8 a2=4000bb3350 a3=25 items=0 ppid=1 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.146000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:13.148571 kubelet[2161]: I0212 19:17:13.148556 2161 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:17:13.148689 kubelet[2161]: I0212 19:17:13.148677 2161 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:17:13.150402 kubelet[2161]: W0212 19:17:13.150341 2161 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.150477 kubelet[2161]: E0212 19:17:13.150423 2161 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.150706 kubelet[2161]: E0212 19:17:13.150614 2161 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f1f3323662.17b3339d0262db54", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f1f3323662", UID:"ci-3510.3.2-a-f1f3323662", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f1f3323662"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 17, 13, 146465108, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 17, 13, 146465108, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.36:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.36:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:17:13.150802 kubelet[2161]: W0212 19:17:13.150776 2161 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-f1f3323662&limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.150830 kubelet[2161]: E0212 19:17:13.150808 2161 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-f1f3323662&limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.150924 kubelet[2161]: E0212 19:17:13.150899 2161 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:17:13.150924 kubelet[2161]: E0212 19:17:13.150923 2161 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:17:13.151588 kubelet[2161]: I0212 19:17:13.151374 2161 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:17:13.150000 audit[2172]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2172 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.150000 audit[2172]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffeef1bce0 a2=0 a3=1 items=0 ppid=2161 pid=2172 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.150000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:17:13.152196 kubelet[2161]: I0212 19:17:13.152180 2161 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 19:17:13.151000 audit[2173]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2173 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.151000 audit[2173]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe39bf6d0 a2=0 a3=1 items=0 ppid=2161 pid=2173 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.151000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:17:13.153575 kubelet[2161]: I0212 19:17:13.153559 2161 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:17:13.154450 kubelet[2161]: E0212 19:17:13.154403 2161 controller.go:146] failed to ensure lease exists, will retry in 200ms, error: Get "https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f1f3323662?timeout=10s": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.155458 kubelet[2161]: I0212 19:17:13.153613 2161 server.go:451] "Adding debug handlers to kubelet server" Feb 12 19:17:13.156295 kubelet[2161]: W0212 19:17:13.156244 2161 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.156295 kubelet[2161]: E0212 19:17:13.156291 2161 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.155000 audit[2175]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2175 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.155000 audit[2175]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffd4c29120 a2=0 a3=1 items=0 ppid=2161 pid=2175 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.155000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:17:13.157000 audit[2177]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.157000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe97a7b60 a2=0 a3=1 items=0 ppid=2161 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.157000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:17:13.246388 kubelet[2161]: I0212 19:17:13.246367 2161 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:17:13.246563 kubelet[2161]: I0212 19:17:13.246552 2161 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:17:13.246638 kubelet[2161]: I0212 19:17:13.246629 2161 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:17:13.250820 kubelet[2161]: I0212 19:17:13.250802 2161 policy_none.go:49] "None policy: Start" Feb 12 19:17:13.251447 kubelet[2161]: I0212 19:17:13.251435 2161 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:17:13.251557 kubelet[2161]: I0212 19:17:13.251547 2161 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:17:13.254247 kubelet[2161]: I0212 19:17:13.254225 2161 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.254597 kubelet[2161]: E0212 19:17:13.254584 2161 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.36:6443/api/v1/nodes\": dial tcp 10.200.20.36:6443: connect: connection refused" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.258572 systemd[1]: Created slice kubepods.slice. Feb 12 19:17:13.262323 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:17:13.265795 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:17:13.267000 audit[2185]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.267000 audit[2185]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd60dc830 a2=0 a3=1 items=0 ppid=2161 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.267000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:17:13.270115 kubelet[2161]: I0212 19:17:13.270097 2161 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:17:13.268000 audit[2161]: AVC avc: denied { mac_admin } for pid=2161 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:13.268000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:13.268000 audit[2161]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e3c690 a1=4000e4c000 a2=4000e3c660 a3=25 items=0 ppid=1 pid=2161 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.268000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:13.270449 kubelet[2161]: I0212 19:17:13.270397 2161 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:17:13.270667 kubelet[2161]: I0212 19:17:13.270654 2161 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:17:13.271319 kubelet[2161]: E0212 19:17:13.271305 2161 eviction_manager.go:261] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-f1f3323662\" not found" Feb 12 19:17:13.275000 audit[2186]: NETFILTER_CFG table=nat:34 family=2 entries=1 op=nft_register_chain pid=2186 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.275000 audit[2186]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc893c740 a2=0 a3=1 items=0 ppid=2161 pid=2186 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.275000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:17:13.353000 audit[2189]: NETFILTER_CFG table=nat:35 family=2 entries=1 op=nft_register_rule pid=2189 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.353000 audit[2189]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffeaa5dee0 a2=0 a3=1 items=0 ppid=2161 pid=2189 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.353000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:17:13.355126 kubelet[2161]: E0212 19:17:13.355082 2161 controller.go:146] failed to ensure lease exists, will retry in 400ms, error: Get "https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f1f3323662?timeout=10s": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.406000 audit[2192]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.406000 audit[2192]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffcdbff490 a2=0 a3=1 items=0 ppid=2161 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.406000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:17:13.409000 audit[2193]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.409000 audit[2193]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffee664920 a2=0 a3=1 items=0 ppid=2161 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:17:13.410000 audit[2194]: NETFILTER_CFG table=nat:38 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.410000 audit[2194]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcefc0be0 a2=0 a3=1 items=0 ppid=2161 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:17:13.412000 audit[2196]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_rule pid=2196 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.412000 audit[2196]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffdf78f830 a2=0 a3=1 items=0 ppid=2161 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.412000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:17:13.414000 audit[2198]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_rule pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.414000 audit[2198]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffdb354890 a2=0 a3=1 items=0 ppid=2161 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:17:13.415000 audit[2200]: NETFILTER_CFG table=nat:41 family=2 entries=1 op=nft_register_rule pid=2200 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.415000 audit[2200]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffec9dd9d0 a2=0 a3=1 items=0 ppid=2161 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.415000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:17:13.418000 audit[2202]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_rule pid=2202 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.418000 audit[2202]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffc928cff0 a2=0 a3=1 items=0 ppid=2161 pid=2202 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.418000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:17:13.420000 audit[2204]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_rule pid=2204 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.420000 audit[2204]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=540 a0=3 a1=ffffd5b33220 a2=0 a3=1 items=0 ppid=2161 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:17:13.422113 kubelet[2161]: I0212 19:17:13.422093 2161 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:17:13.421000 audit[2205]: NETFILTER_CFG table=mangle:44 family=10 entries=2 op=nft_register_chain pid=2205 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.421000 audit[2205]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdf4d3eb0 a2=0 a3=1 items=0 ppid=2161 pid=2205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.421000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:17:13.421000 audit[2206]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2206 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.421000 audit[2206]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6ac9850 a2=0 a3=1 items=0 ppid=2161 pid=2206 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.421000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:17:13.422000 audit[2207]: NETFILTER_CFG table=nat:46 family=2 entries=1 op=nft_register_chain pid=2207 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.422000 audit[2207]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff9a12e70 a2=0 a3=1 items=0 ppid=2161 pid=2207 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.422000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:17:13.423000 audit[2208]: NETFILTER_CFG table=nat:47 family=10 entries=2 op=nft_register_chain pid=2208 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.423000 audit[2208]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc0a0d860 a2=0 a3=1 items=0 ppid=2161 pid=2208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.423000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D44524F50002D74006E6174 Feb 12 19:17:13.423000 audit[2209]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2209 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:13.423000 audit[2209]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffeb5ae070 a2=0 a3=1 items=0 ppid=2161 pid=2209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.423000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:17:13.425000 audit[2211]: NETFILTER_CFG table=nat:49 family=10 entries=1 op=nft_register_rule pid=2211 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.425000 audit[2211]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffcb1f0420 a2=0 a3=1 items=0 ppid=2161 pid=2211 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.425000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D44524F50002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303038303030 Feb 12 19:17:13.426000 audit[2212]: NETFILTER_CFG table=filter:50 family=10 entries=2 op=nft_register_chain pid=2212 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.426000 audit[2212]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=132 a0=3 a1=ffffdc5b7350 a2=0 a3=1 items=0 ppid=2161 pid=2212 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.426000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:17:13.428000 audit[2214]: NETFILTER_CFG table=filter:51 family=10 entries=1 op=nft_register_rule pid=2214 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.428000 audit[2214]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=664 a0=3 a1=ffffea01a4f0 a2=0 a3=1 items=0 ppid=2161 pid=2214 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.428000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206669726577616C6C20666F722064726F7070696E67206D61726B6564207061636B657473002D6D006D61726B Feb 12 19:17:13.429000 audit[2215]: NETFILTER_CFG table=nat:52 family=10 entries=1 op=nft_register_chain pid=2215 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.429000 audit[2215]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff2c617e0 a2=0 a3=1 items=0 ppid=2161 pid=2215 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.429000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4D41524B2D4D415351002D74006E6174 Feb 12 19:17:13.430000 audit[2216]: NETFILTER_CFG table=nat:53 family=10 entries=1 op=nft_register_chain pid=2216 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.430000 audit[2216]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2da3280 a2=0 a3=1 items=0 ppid=2161 pid=2216 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.430000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:17:13.432000 audit[2218]: NETFILTER_CFG table=nat:54 family=10 entries=1 op=nft_register_rule pid=2218 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.432000 audit[2218]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffeccb7450 a2=0 a3=1 items=0 ppid=2161 pid=2218 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.432000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D4D41524B2D4D415351002D74006E6174002D6A004D41524B002D2D6F722D6D61726B0030783030303034303030 Feb 12 19:17:13.433000 audit[2220]: NETFILTER_CFG table=nat:55 family=10 entries=2 op=nft_register_chain pid=2220 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.433000 audit[2220]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffc751e5e0 a2=0 a3=1 items=0 ppid=2161 pid=2220 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.433000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:17:13.435000 audit[2222]: NETFILTER_CFG table=nat:56 family=10 entries=1 op=nft_register_rule pid=2222 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.435000 audit[2222]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=364 a0=3 a1=ffffcf074000 a2=0 a3=1 items=0 ppid=2161 pid=2222 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.435000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D006D61726B0000002D2D6D61726B00307830303030343030302F30783030303034303030002D6A0052455455524E Feb 12 19:17:13.437000 audit[2224]: NETFILTER_CFG table=nat:57 family=10 entries=1 op=nft_register_rule pid=2224 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.437000 audit[2224]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=220 a0=3 a1=ffffe31aa720 a2=0 a3=1 items=0 ppid=2161 pid=2224 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.437000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6A004D41524B002D2D786F722D6D61726B0030783030303034303030 Feb 12 19:17:13.456435 kubelet[2161]: I0212 19:17:13.456399 2161 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.457146 kubelet[2161]: E0212 19:17:13.457119 2161 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.36:6443/api/v1/nodes\": dial tcp 10.200.20.36:6443: connect: connection refused" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.490000 audit[2226]: NETFILTER_CFG table=nat:58 family=10 entries=1 op=nft_register_rule pid=2226 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.490000 audit[2226]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=556 a0=3 a1=fffffba50530 a2=0 a3=1 items=0 ppid=2161 pid=2226 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.490000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D41004B5542452D504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732073657276696365207472616666696320726571756972696E6720534E4154002D6A004D415351554552414445 Feb 12 19:17:13.492035 kubelet[2161]: I0212 19:17:13.492006 2161 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:17:13.492035 kubelet[2161]: I0212 19:17:13.492036 2161 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 19:17:13.492113 kubelet[2161]: I0212 19:17:13.492055 2161 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 19:17:13.492113 kubelet[2161]: E0212 19:17:13.492099 2161 kubelet.go:2137] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:17:13.492846 kubelet[2161]: W0212 19:17:13.492824 2161 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.492943 kubelet[2161]: E0212 19:17:13.492934 2161 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.492000 audit[2227]: NETFILTER_CFG table=mangle:59 family=10 entries=1 op=nft_register_chain pid=2227 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.492000 audit[2227]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff2530e80 a2=0 a3=1 items=0 ppid=2161 pid=2227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.492000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:17:13.493000 audit[2228]: NETFILTER_CFG table=nat:60 family=10 entries=1 op=nft_register_chain pid=2228 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.493000 audit[2228]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc2fe80f0 a2=0 a3=1 items=0 ppid=2161 pid=2228 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:17:13.494000 audit[2229]: NETFILTER_CFG table=filter:61 family=10 entries=1 op=nft_register_chain pid=2229 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:13.494000 audit[2229]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdd608c90 a2=0 a3=1 items=0 ppid=2161 pid=2229 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:13.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:17:13.586971 kubelet[2161]: E0212 19:17:13.586857 2161 event.go:276] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-f1f3323662.17b3339d0262db54", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-f1f3323662", UID:"ci-3510.3.2-a-f1f3323662", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-f1f3323662"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 17, 13, 146465108, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 17, 13, 146465108, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.36:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.36:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:17:13.593134 kubelet[2161]: I0212 19:17:13.593114 2161 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:13.594659 kubelet[2161]: I0212 19:17:13.594632 2161 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:13.595800 kubelet[2161]: I0212 19:17:13.595783 2161 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:13.597254 kubelet[2161]: I0212 19:17:13.597235 2161 status_manager.go:698] "Failed to get status for pod" podUID=cbbd06f364fe4dec80c8eaa8fdc8d356 pod="kube-system/kube-apiserver-ci-3510.3.2-a-f1f3323662" err="Get \"https://10.200.20.36:6443/api/v1/namespaces/kube-system/pods/kube-apiserver-ci-3510.3.2-a-f1f3323662\": dial tcp 10.200.20.36:6443: connect: connection refused" Feb 12 19:17:13.598606 kubelet[2161]: I0212 19:17:13.598590 2161 status_manager.go:698] "Failed to get status for pod" podUID=62271d3789ccc05506d1d3e025ad8470 pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" err="Get \"https://10.200.20.36:6443/api/v1/namespaces/kube-system/pods/kube-controller-manager-ci-3510.3.2-a-f1f3323662\": dial tcp 10.200.20.36:6443: connect: connection refused" Feb 12 19:17:13.599619 kubelet[2161]: I0212 19:17:13.599603 2161 status_manager.go:698] "Failed to get status for pod" podUID=b491574d30ffe8e5a0a85d74fb2850ac pod="kube-system/kube-scheduler-ci-3510.3.2-a-f1f3323662" err="Get \"https://10.200.20.36:6443/api/v1/namespaces/kube-system/pods/kube-scheduler-ci-3510.3.2-a-f1f3323662\": dial tcp 10.200.20.36:6443: connect: connection refused" Feb 12 19:17:13.601828 systemd[1]: Created slice kubepods-burstable-podcbbd06f364fe4dec80c8eaa8fdc8d356.slice. Feb 12 19:17:13.622301 systemd[1]: Created slice kubepods-burstable-pod62271d3789ccc05506d1d3e025ad8470.slice. Feb 12 19:17:13.636726 systemd[1]: Created slice kubepods-burstable-podb491574d30ffe8e5a0a85d74fb2850ac.slice. Feb 12 19:17:13.655694 kubelet[2161]: I0212 19:17:13.655655 2161 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.655694 kubelet[2161]: I0212 19:17:13.655702 2161 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.655858 kubelet[2161]: I0212 19:17:13.655727 2161 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cbbd06f364fe4dec80c8eaa8fdc8d356-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-f1f3323662\" (UID: \"cbbd06f364fe4dec80c8eaa8fdc8d356\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.655858 kubelet[2161]: I0212 19:17:13.655752 2161 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cbbd06f364fe4dec80c8eaa8fdc8d356-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-f1f3323662\" (UID: \"cbbd06f364fe4dec80c8eaa8fdc8d356\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.655858 kubelet[2161]: I0212 19:17:13.655779 2161 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.655858 kubelet[2161]: I0212 19:17:13.655800 2161 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.655858 kubelet[2161]: I0212 19:17:13.655820 2161 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b491574d30ffe8e5a0a85d74fb2850ac-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-f1f3323662\" (UID: \"b491574d30ffe8e5a0a85d74fb2850ac\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.655975 kubelet[2161]: I0212 19:17:13.655840 2161 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cbbd06f364fe4dec80c8eaa8fdc8d356-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-f1f3323662\" (UID: \"cbbd06f364fe4dec80c8eaa8fdc8d356\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.655975 kubelet[2161]: I0212 19:17:13.655861 2161 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.756561 kubelet[2161]: E0212 19:17:13.756517 2161 controller.go:146] failed to ensure lease exists, will retry in 800ms, error: Get "https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f1f3323662?timeout=10s": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:13.859418 kubelet[2161]: I0212 19:17:13.859382 2161 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.859715 kubelet[2161]: E0212 19:17:13.859697 2161 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.36:6443/api/v1/nodes\": dial tcp 10.200.20.36:6443: connect: connection refused" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:13.920640 env[1378]: time="2024-02-12T19:17:13.920601607Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-f1f3323662,Uid:cbbd06f364fe4dec80c8eaa8fdc8d356,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:13.924739 env[1378]: time="2024-02-12T19:17:13.924702867Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-f1f3323662,Uid:62271d3789ccc05506d1d3e025ad8470,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:13.939143 env[1378]: time="2024-02-12T19:17:13.939098755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-f1f3323662,Uid:b491574d30ffe8e5a0a85d74fb2850ac,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:14.049317 kubelet[2161]: W0212 19:17:14.049187 2161 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:14.049317 kubelet[2161]: E0212 19:17:14.049246 2161 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.36:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:14.207845 kubelet[2161]: W0212 19:17:14.207788 2161 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:14.207845 kubelet[2161]: E0212 19:17:14.207846 2161 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.36:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:14.557463 kubelet[2161]: E0212 19:17:14.557388 2161 controller.go:146] failed to ensure lease exists, will retry in 1.6s, error: Get "https://10.200.20.36:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-f1f3323662?timeout=10s": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:14.621962 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3575733843.mount: Deactivated successfully. Feb 12 19:17:14.633085 kubelet[2161]: W0212 19:17:14.633049 2161 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:14.633085 kubelet[2161]: E0212 19:17:14.633091 2161 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.36:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:14.647706 env[1378]: time="2024-02-12T19:17:14.647643493Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.661917 kubelet[2161]: I0212 19:17:14.661873 2161 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:14.662204 kubelet[2161]: E0212 19:17:14.662181 2161 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.36:6443/api/v1/nodes\": dial tcp 10.200.20.36:6443: connect: connection refused" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:14.666677 env[1378]: time="2024-02-12T19:17:14.666633001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.671423 env[1378]: time="2024-02-12T19:17:14.671383058Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.677729 env[1378]: time="2024-02-12T19:17:14.677691107Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.688948 env[1378]: time="2024-02-12T19:17:14.688911932Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.689789 kubelet[2161]: W0212 19:17:14.689717 2161 reflector.go:424] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-f1f3323662&limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:14.689789 kubelet[2161]: E0212 19:17:14.689773 2161 reflector.go:140] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.36:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-f1f3323662&limit=500&resourceVersion=0": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:14.693749 env[1378]: time="2024-02-12T19:17:14.693712949Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.696242 env[1378]: time="2024-02-12T19:17:14.696214336Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.702297 env[1378]: time="2024-02-12T19:17:14.702255667Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.704911 env[1378]: time="2024-02-12T19:17:14.704883854Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.707997 env[1378]: time="2024-02-12T19:17:14.707959959Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.709807 env[1378]: time="2024-02-12T19:17:14.709782350Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.714762 env[1378]: time="2024-02-12T19:17:14.714733126Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:14.834263 env[1378]: time="2024-02-12T19:17:14.833671506Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:14.834263 env[1378]: time="2024-02-12T19:17:14.833714306Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:14.834263 env[1378]: time="2024-02-12T19:17:14.833724786Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:14.835540 env[1378]: time="2024-02-12T19:17:14.835478218Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8443668a3a9e3efdf98003f558d23ef755059969b8682ce16ae77a4ed6bfacd pid=2244 runtime=io.containerd.runc.v2 Feb 12 19:17:14.835985 env[1378]: time="2024-02-12T19:17:14.835928495Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:14.836045 env[1378]: time="2024-02-12T19:17:14.836000295Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:14.836045 env[1378]: time="2024-02-12T19:17:14.836028775Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:14.836185 env[1378]: time="2024-02-12T19:17:14.836142534Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c55cf3df7de21fe406a3ee1946f47a86406256a308133ed856950e9182e57c3d pid=2258 runtime=io.containerd.runc.v2 Feb 12 19:17:14.837356 env[1378]: time="2024-02-12T19:17:14.837283609Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:14.837912 env[1378]: time="2024-02-12T19:17:14.837331728Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:14.838027 env[1378]: time="2024-02-12T19:17:14.837989085Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:14.838640 env[1378]: time="2024-02-12T19:17:14.838577682Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/de5f93f8b1a8a51bb4be092bd72b03c25e86740e4f463a3f2b8d63e22dabaf57 pid=2255 runtime=io.containerd.runc.v2 Feb 12 19:17:14.847579 systemd[1]: Started cri-containerd-c55cf3df7de21fe406a3ee1946f47a86406256a308133ed856950e9182e57c3d.scope. Feb 12 19:17:14.859386 systemd[1]: Started cri-containerd-b8443668a3a9e3efdf98003f558d23ef755059969b8682ce16ae77a4ed6bfacd.scope. Feb 12 19:17:14.865825 systemd[1]: Started cri-containerd-de5f93f8b1a8a51bb4be092bd72b03c25e86740e4f463a3f2b8d63e22dabaf57.scope. Feb 12 19:17:14.883340 kernel: kauditd_printk_skb: 280 callbacks suppressed Feb 12 19:17:14.883461 kernel: audit: type=1400 audit(1707765434.876:602): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.922272 kernel: audit: type=1400 audit(1707765434.876:603): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.942045 kernel: audit: type=1400 audit(1707765434.876:604): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.942133 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:17:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.972610 kernel: audit: type=1400 audit(1707765434.876:605): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.972725 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:17:14.972754 kernel: audit: backlog limit exceeded Feb 12 19:17:14.972777 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:17:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.982433 kernel: audit: type=1400 audit(1707765434.876:606): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.982492 kernel: audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:17:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.876000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.876000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.885000 audit: BPF prog-id=62 op=LOAD Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2244 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:14.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343433363638613361396533656664663938303033663535386432 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2244 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:14.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343433363638613361396533656664663938303033663535386432 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.901000 audit: BPF prog-id=63 op=LOAD Feb 12 19:17:14.901000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2244 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:14.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343433363638613361396533656664663938303033663535386432 Feb 12 19:17:14.920000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.920000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.920000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.920000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.920000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.920000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.920000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.920000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.920000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.920000 audit: BPF prog-id=64 op=LOAD Feb 12 19:17:14.920000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2244 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:14.920000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343433363638613361396533656664663938303033663535386432 Feb 12 19:17:14.921000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:17:14.921000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { perfmon } for pid=2283 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit[2283]: AVC avc: denied { bpf } for pid=2283 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.921000 audit: BPF prog-id=65 op=LOAD Feb 12 19:17:14.921000 audit[2283]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2244 pid=2283 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:14.921000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238343433363638613361396533656664663938303033663535386432 Feb 12 19:17:14.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.964000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit: BPF prog-id=66 op=LOAD Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2258 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335356366336466376465323166653430366133656531393436663437 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2258 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335356366336466376465323166653430366133656531393436663437 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit: BPF prog-id=67 op=LOAD Feb 12 19:17:15.006000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2258 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335356366336466376465323166653430366133656531393436663437 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit: BPF prog-id=68 op=LOAD Feb 12 19:17:15.006000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2258 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335356366336466376465323166653430366133656531393436663437 Feb 12 19:17:15.006000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:17:15.006000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { perfmon } for pid=2282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit[2282]: AVC avc: denied { bpf } for pid=2282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.006000 audit: BPF prog-id=69 op=LOAD Feb 12 19:17:15.006000 audit[2282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2258 pid=2282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335356366336466376465323166653430366133656531393436663437 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit: BPF prog-id=70 op=LOAD Feb 12 19:17:15.008000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.008000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2255 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.008000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465356639336638623161386135316262346265303932626437326230 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2255 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465356639336638623161386135316262346265303932626437326230 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.012000 audit: BPF prog-id=71 op=LOAD Feb 12 19:17:15.012000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2255 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465356639336638623161386135316262346265303932626437326230 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit: BPF prog-id=72 op=LOAD Feb 12 19:17:15.013000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2255 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465356639336638623161386135316262346265303932626437326230 Feb 12 19:17:15.013000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:17:15.013000 audit: BPF prog-id=71 op=UNLOAD Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { perfmon } for pid=2294 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit[2294]: AVC avc: denied { bpf } for pid=2294 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.013000 audit: BPF prog-id=73 op=LOAD Feb 12 19:17:15.013000 audit[2294]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2255 pid=2294 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465356639336638623161386135316262346265303932626437326230 Feb 12 19:17:15.027060 env[1378]: time="2024-02-12T19:17:15.026999007Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-f1f3323662,Uid:62271d3789ccc05506d1d3e025ad8470,Namespace:kube-system,Attempt:0,} returns sandbox id \"c55cf3df7de21fe406a3ee1946f47a86406256a308133ed856950e9182e57c3d\"" Feb 12 19:17:15.032021 env[1378]: time="2024-02-12T19:17:15.031970183Z" level=info msg="CreateContainer within sandbox \"c55cf3df7de21fe406a3ee1946f47a86406256a308133ed856950e9182e57c3d\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:17:15.037482 env[1378]: time="2024-02-12T19:17:15.037365757Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-f1f3323662,Uid:b491574d30ffe8e5a0a85d74fb2850ac,Namespace:kube-system,Attempt:0,} returns sandbox id \"b8443668a3a9e3efdf98003f558d23ef755059969b8682ce16ae77a4ed6bfacd\"" Feb 12 19:17:15.045593 env[1378]: time="2024-02-12T19:17:15.044500443Z" level=info msg="CreateContainer within sandbox \"b8443668a3a9e3efdf98003f558d23ef755059969b8682ce16ae77a4ed6bfacd\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:17:15.045593 env[1378]: time="2024-02-12T19:17:15.045574638Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-f1f3323662,Uid:cbbd06f364fe4dec80c8eaa8fdc8d356,Namespace:kube-system,Attempt:0,} returns sandbox id \"de5f93f8b1a8a51bb4be092bd72b03c25e86740e4f463a3f2b8d63e22dabaf57\"" Feb 12 19:17:15.047954 env[1378]: time="2024-02-12T19:17:15.047926627Z" level=info msg="CreateContainer within sandbox \"de5f93f8b1a8a51bb4be092bd72b03c25e86740e4f463a3f2b8d63e22dabaf57\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:17:15.146806 env[1378]: time="2024-02-12T19:17:15.145860440Z" level=info msg="CreateContainer within sandbox \"c55cf3df7de21fe406a3ee1946f47a86406256a308133ed856950e9182e57c3d\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"06224ecff93fad1a660f1380632dff7276e7655e6af43b51c9abc5aad900bd04\"" Feb 12 19:17:15.152000 env[1378]: time="2024-02-12T19:17:15.151594933Z" level=info msg="CreateContainer within sandbox \"de5f93f8b1a8a51bb4be092bd72b03c25e86740e4f463a3f2b8d63e22dabaf57\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"8745112553b7085eb28330dcd324525e78613fd26a50d5acc59c93f83512f4f9\"" Feb 12 19:17:15.152401 env[1378]: time="2024-02-12T19:17:15.152376609Z" level=info msg="StartContainer for \"06224ecff93fad1a660f1380632dff7276e7655e6af43b51c9abc5aad900bd04\"" Feb 12 19:17:15.153110 env[1378]: time="2024-02-12T19:17:15.153077326Z" level=info msg="StartContainer for \"8745112553b7085eb28330dcd324525e78613fd26a50d5acc59c93f83512f4f9\"" Feb 12 19:17:15.157336 env[1378]: time="2024-02-12T19:17:15.157282786Z" level=info msg="CreateContainer within sandbox \"b8443668a3a9e3efdf98003f558d23ef755059969b8682ce16ae77a4ed6bfacd\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"715dee777eafdf79235c0a280abbf5bb6cd49f3a1c42eb29b390ed2e16fb1e79\"" Feb 12 19:17:15.162948 kubelet[2161]: E0212 19:17:15.162917 2161 certificate_manager.go:471] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.36:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.36:6443: connect: connection refused Feb 12 19:17:15.163747 env[1378]: time="2024-02-12T19:17:15.163708875Z" level=info msg="StartContainer for \"715dee777eafdf79235c0a280abbf5bb6cd49f3a1c42eb29b390ed2e16fb1e79\"" Feb 12 19:17:15.178344 systemd[1]: Started cri-containerd-8745112553b7085eb28330dcd324525e78613fd26a50d5acc59c93f83512f4f9.scope. Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.193000 audit: BPF prog-id=74 op=LOAD Feb 12 19:17:15.194000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.194000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2255 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343531313235353362373038356562323833333064636433323435 Feb 12 19:17:15.194000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.194000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2255 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.194000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343531313235353362373038356562323833333064636433323435 Feb 12 19:17:15.197577 systemd[1]: Started cri-containerd-715dee777eafdf79235c0a280abbf5bb6cd49f3a1c42eb29b390ed2e16fb1e79.scope. Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.196000 audit: BPF prog-id=75 op=LOAD Feb 12 19:17:15.196000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2255 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.196000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343531313235353362373038356562323833333064636433323435 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit: BPF prog-id=76 op=LOAD Feb 12 19:17:15.197000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2255 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343531313235353362373038356562323833333064636433323435 Feb 12 19:17:15.197000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:17:15.197000 audit: BPF prog-id=75 op=UNLOAD Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.197000 audit: BPF prog-id=77 op=LOAD Feb 12 19:17:15.197000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2255 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.197000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3837343531313235353362373038356562323833333064636433323435 Feb 12 19:17:15.211067 systemd[1]: Started cri-containerd-06224ecff93fad1a660f1380632dff7276e7655e6af43b51c9abc5aad900bd04.scope. Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit: BPF prog-id=78 op=LOAD Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2244 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731356465653737376561666466373932333563306132383061626266 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2244 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731356465653737376561666466373932333563306132383061626266 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit: BPF prog-id=79 op=LOAD Feb 12 19:17:15.224000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2244 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731356465653737376561666466373932333563306132383061626266 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.224000 audit: BPF prog-id=80 op=LOAD Feb 12 19:17:15.224000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2244 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.224000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731356465653737376561666466373932333563306132383061626266 Feb 12 19:17:15.225000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:17:15.225000 audit: BPF prog-id=79 op=UNLOAD Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { perfmon } for pid=2390 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit[2390]: AVC avc: denied { bpf } for pid=2390 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.225000 audit: BPF prog-id=81 op=LOAD Feb 12 19:17:15.225000 audit[2390]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2244 pid=2390 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.225000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731356465653737376561666466373932333563306132383061626266 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit: BPF prog-id=82 op=LOAD Feb 12 19:17:15.234000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.234000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2258 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.234000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036323234656366663933666164316136363066313338303633326466 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2258 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036323234656366663933666164316136363066313338303633326466 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit: BPF prog-id=83 op=LOAD Feb 12 19:17:15.235000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2258 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036323234656366663933666164316136363066313338303633326466 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit: BPF prog-id=84 op=LOAD Feb 12 19:17:15.235000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2258 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036323234656366663933666164316136363066313338303633326466 Feb 12 19:17:15.235000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:17:15.235000 audit: BPF prog-id=83 op=UNLOAD Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { perfmon } for pid=2388 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit[2388]: AVC avc: denied { bpf } for pid=2388 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.235000 audit: BPF prog-id=85 op=LOAD Feb 12 19:17:15.235000 audit[2388]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2258 pid=2388 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036323234656366663933666164316136363066313338303633326466 Feb 12 19:17:15.240315 env[1378]: time="2024-02-12T19:17:15.240262390Z" level=info msg="StartContainer for \"8745112553b7085eb28330dcd324525e78613fd26a50d5acc59c93f83512f4f9\" returns successfully" Feb 12 19:17:15.262458 env[1378]: time="2024-02-12T19:17:15.262391485Z" level=info msg="StartContainer for \"06224ecff93fad1a660f1380632dff7276e7655e6af43b51c9abc5aad900bd04\" returns successfully" Feb 12 19:17:15.275747 env[1378]: time="2024-02-12T19:17:15.275688181Z" level=info msg="StartContainer for \"715dee777eafdf79235c0a280abbf5bb6cd49f3a1c42eb29b390ed2e16fb1e79\" returns successfully" Feb 12 19:17:16.264003 kubelet[2161]: I0212 19:17:16.263979 2161 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:17.195000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:17.195000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400039a1e0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:17.195000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:17.195000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:17.195000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40010ee040 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:17.195000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:17.756000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:17.756000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=400100b410 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:17:17.756000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:17.756000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:17.756000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=46 a1=40010eaa20 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:17:17.756000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:17.756000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:17.756000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=45 a1=40010eaa50 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:17:17.756000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:17.758000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:17.758000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=51 a1=4002c3ab80 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:17:17.758000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:17.850000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:17.850000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=400182bb20 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:17:17.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:17.850000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:17.850000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=83 a1=400438ed80 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:17:17.850000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:17.981769 kubelet[2161]: I0212 19:17:17.981736 2161 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:18.154123 kubelet[2161]: I0212 19:17:18.154007 2161 apiserver.go:52] "Watching apiserver" Feb 12 19:17:18.254302 kubelet[2161]: I0212 19:17:18.254238 2161 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:17:18.294345 kubelet[2161]: I0212 19:17:18.294300 2161 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:17:20.493456 systemd[1]: Reloading. Feb 12 19:17:20.557909 /usr/lib/systemd/system-generators/torcx-generator[2491]: time="2024-02-12T19:17:20Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:17:20.557941 /usr/lib/systemd/system-generators/torcx-generator[2491]: time="2024-02-12T19:17:20Z" level=info msg="torcx already run" Feb 12 19:17:20.633294 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:17:20.633507 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:17:20.651189 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:17:20.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.734883 kernel: kauditd_printk_skb: 360 callbacks suppressed Feb 12 19:17:20.734951 kernel: audit: type=1400 audit(1707765440.727:716): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.727000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.772440 kernel: audit: type=1400 audit(1707765440.727:717): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.792344 kernel: audit: type=1400 audit(1707765440.728:718): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.811664 kernel: audit: type=1400 audit(1707765440.728:719): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.836331 kernel: audit: type=1400 audit(1707765440.728:720): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.836452 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:17:20.836484 kernel: audit: type=1400 audit(1707765440.728:721): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.860991 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:17:20.861158 kernel: audit: type=1400 audit(1707765440.728:722): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.880312 kernel: audit: backlog limit exceeded Feb 12 19:17:20.728000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.728000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit: BPF prog-id=86 op=LOAD Feb 12 19:17:20.733000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.733000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.752000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.752000 audit: BPF prog-id=87 op=LOAD Feb 12 19:17:20.752000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:17:20.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.753000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit: BPF prog-id=88 op=LOAD Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.771000 audit: BPF prog-id=89 op=LOAD Feb 12 19:17:20.772000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:17:20.772000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:17:20.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.774000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.774000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.791000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.791000 audit: BPF prog-id=90 op=LOAD Feb 12 19:17:20.791000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:17:20.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.792000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.792000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.810000 audit: BPF prog-id=91 op=LOAD Feb 12 19:17:20.810000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit: BPF prog-id=92 op=LOAD Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit: BPF prog-id=93 op=LOAD Feb 12 19:17:20.883000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:17:20.883000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.883000 audit: BPF prog-id=94 op=LOAD Feb 12 19:17:20.883000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.885000 audit: BPF prog-id=95 op=LOAD Feb 12 19:17:20.885000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit: BPF prog-id=96 op=LOAD Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit: BPF prog-id=97 op=LOAD Feb 12 19:17:20.886000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:17:20.886000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit: BPF prog-id=98 op=LOAD Feb 12 19:17:20.887000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.887000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.888000 audit: BPF prog-id=99 op=LOAD Feb 12 19:17:20.888000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit: BPF prog-id=100 op=LOAD Feb 12 19:17:20.889000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit: BPF prog-id=101 op=LOAD Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.889000 audit: BPF prog-id=102 op=LOAD Feb 12 19:17:20.889000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:17:20.889000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit: BPF prog-id=103 op=LOAD Feb 12 19:17:20.890000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.890000 audit: BPF prog-id=104 op=LOAD Feb 12 19:17:20.890000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit: BPF prog-id=105 op=LOAD Feb 12 19:17:20.891000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:20.891000 audit: BPF prog-id=106 op=LOAD Feb 12 19:17:20.891000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:17:20.912997 systemd[1]: Stopping kubelet.service... Feb 12 19:17:20.937706 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:17:20.937920 systemd[1]: Stopped kubelet.service. Feb 12 19:17:20.936000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:20.937982 systemd[1]: kubelet.service: Consumed 1.030s CPU time. Feb 12 19:17:20.939000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:20.940147 systemd[1]: Started kubelet.service. Feb 12 19:17:21.022218 kubelet[2548]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:17:21.022647 kubelet[2548]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:17:21.023019 kubelet[2548]: I0212 19:17:21.022761 2548 server.go:198] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:17:21.025858 kubelet[2548]: Flag --pod-infra-container-image has been deprecated, will be removed in 1.27. Image garbage collector will get sandbox image information from CRI. Feb 12 19:17:21.026040 kubelet[2548]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:17:21.029234 kubelet[2548]: I0212 19:17:21.029205 2548 server.go:412] "Kubelet version" kubeletVersion="v1.26.5" Feb 12 19:17:21.029234 kubelet[2548]: I0212 19:17:21.029228 2548 server.go:414] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:17:21.029465 kubelet[2548]: I0212 19:17:21.029394 2548 server.go:836] "Client rotation is on, will bootstrap in background" Feb 12 19:17:21.030574 kubelet[2548]: I0212 19:17:21.030553 2548 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:17:21.031546 kubelet[2548]: I0212 19:17:21.031529 2548 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:17:21.033189 kubelet[2548]: W0212 19:17:21.033170 2548 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:17:21.033786 kubelet[2548]: I0212 19:17:21.033765 2548 server.go:659] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:17:21.034216 kubelet[2548]: I0212 19:17:21.034200 2548 container_manager_linux.go:267] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:17:21.034280 kubelet[2548]: I0212 19:17:21.034263 2548 container_manager_linux.go:272] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] ExperimentalTopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] ExperimentalPodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms ExperimentalTopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:17:21.034361 kubelet[2548]: I0212 19:17:21.034287 2548 topology_manager.go:134] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:17:21.034361 kubelet[2548]: I0212 19:17:21.034299 2548 container_manager_linux.go:308] "Creating device plugin manager" Feb 12 19:17:21.034361 kubelet[2548]: I0212 19:17:21.034325 2548 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:17:21.037589 kubelet[2548]: I0212 19:17:21.037571 2548 kubelet.go:398] "Attempting to sync node with API server" Feb 12 19:17:21.037713 kubelet[2548]: I0212 19:17:21.037702 2548 kubelet.go:286] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:17:21.037787 kubelet[2548]: I0212 19:17:21.037778 2548 kubelet.go:297] "Adding apiserver pod source" Feb 12 19:17:21.037851 kubelet[2548]: I0212 19:17:21.037843 2548 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:17:21.043301 kubelet[2548]: I0212 19:17:21.043278 2548 kuberuntime_manager.go:244] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:17:21.043827 kubelet[2548]: I0212 19:17:21.043808 2548 server.go:1186] "Started kubelet" Feb 12 19:17:21.046000 audit[2548]: AVC avc: denied { mac_admin } for pid=2548 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:21.046000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:21.046000 audit[2548]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ed67e0 a1=4000e45350 a2=4000ed67b0 a3=25 items=0 ppid=1 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:21.046000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:21.046000 audit[2548]: AVC avc: denied { mac_admin } for pid=2548 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:21.046000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:21.046000 audit[2548]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000e43fa0 a1=4000e45368 a2=4000ed6870 a3=25 items=0 ppid=1 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:21.046000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:21.050117 kubelet[2548]: I0212 19:17:21.047937 2548 kubelet.go:1341] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:17:21.050117 kubelet[2548]: I0212 19:17:21.047977 2548 kubelet.go:1345] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:17:21.050117 kubelet[2548]: I0212 19:17:21.047994 2548 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:17:21.050191 kubelet[2548]: I0212 19:17:21.050137 2548 server.go:161] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:17:21.052278 kubelet[2548]: I0212 19:17:21.052245 2548 server.go:451] "Adding debug handlers to kubelet server" Feb 12 19:17:21.063242 kubelet[2548]: I0212 19:17:21.063195 2548 volume_manager.go:293] "Starting Kubelet Volume Manager" Feb 12 19:17:21.070306 kubelet[2548]: I0212 19:17:21.070280 2548 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:17:21.075457 kubelet[2548]: E0212 19:17:21.075267 2548 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:17:21.075457 kubelet[2548]: E0212 19:17:21.075303 2548 kubelet.go:1386] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:17:21.126335 kubelet[2548]: I0212 19:17:21.126314 2548 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:17:21.182386 kubelet[2548]: I0212 19:17:21.182304 2548 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.184263 kubelet[2548]: I0212 19:17:21.184245 2548 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:17:21.184389 kubelet[2548]: I0212 19:17:21.184372 2548 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:17:21.184504 kubelet[2548]: I0212 19:17:21.184492 2548 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:17:21.187097 kubelet[2548]: I0212 19:17:21.184726 2548 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:17:21.187249 kubelet[2548]: I0212 19:17:21.187235 2548 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 19:17:21.187333 kubelet[2548]: I0212 19:17:21.187323 2548 policy_none.go:49] "None policy: Start" Feb 12 19:17:21.188881 kubelet[2548]: I0212 19:17:21.188862 2548 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:17:21.189948 kubelet[2548]: I0212 19:17:21.189931 2548 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:17:21.190214 kubelet[2548]: I0212 19:17:21.190200 2548 state_mem.go:75] "Updated machine memory state" Feb 12 19:17:21.198769 kubelet[2548]: I0212 19:17:21.198750 2548 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:17:21.198889 kubelet[2548]: I0212 19:17:21.198879 2548 status_manager.go:176] "Starting to sync pod status with apiserver" Feb 12 19:17:21.198968 kubelet[2548]: I0212 19:17:21.198958 2548 kubelet.go:2113] "Starting kubelet main sync loop" Feb 12 19:17:21.199067 kubelet[2548]: E0212 19:17:21.199058 2548 kubelet.go:2137] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:17:21.199824 kubelet[2548]: I0212 19:17:21.199805 2548 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.201996 kubelet[2548]: I0212 19:17:21.201954 2548 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.202956 kubelet[2548]: I0212 19:17:21.202939 2548 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:17:21.201000 audit[2548]: AVC avc: denied { mac_admin } for pid=2548 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:21.201000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:21.201000 audit[2548]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000ed6db0 a1=4000e45248 a2=4000ed6c90 a3=25 items=0 ppid=1 pid=2548 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:21.201000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:21.203673 kubelet[2548]: I0212 19:17:21.203382 2548 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:17:21.203968 kubelet[2548]: I0212 19:17:21.203953 2548 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:17:21.300115 kubelet[2548]: I0212 19:17:21.300016 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:21.300344 kubelet[2548]: I0212 19:17:21.300328 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:21.300459 kubelet[2548]: I0212 19:17:21.300447 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:21.471614 kubelet[2548]: I0212 19:17:21.471584 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/cbbd06f364fe4dec80c8eaa8fdc8d356-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-f1f3323662\" (UID: \"cbbd06f364fe4dec80c8eaa8fdc8d356\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.471809 kubelet[2548]: I0212 19:17:21.471797 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.471941 kubelet[2548]: I0212 19:17:21.471930 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.472040 kubelet[2548]: I0212 19:17:21.472030 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.472152 kubelet[2548]: I0212 19:17:21.472143 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.472248 kubelet[2548]: I0212 19:17:21.472239 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/b491574d30ffe8e5a0a85d74fb2850ac-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-f1f3323662\" (UID: \"b491574d30ffe8e5a0a85d74fb2850ac\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.472348 kubelet[2548]: I0212 19:17:21.472339 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/cbbd06f364fe4dec80c8eaa8fdc8d356-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-f1f3323662\" (UID: \"cbbd06f364fe4dec80c8eaa8fdc8d356\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.472470 kubelet[2548]: I0212 19:17:21.472459 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/cbbd06f364fe4dec80c8eaa8fdc8d356-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-f1f3323662\" (UID: \"cbbd06f364fe4dec80c8eaa8fdc8d356\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:21.472607 kubelet[2548]: I0212 19:17:21.472598 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/62271d3789ccc05506d1d3e025ad8470-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" (UID: \"62271d3789ccc05506d1d3e025ad8470\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:22.043509 kubelet[2548]: I0212 19:17:22.043468 2548 apiserver.go:52] "Watching apiserver" Feb 12 19:17:22.071226 kubelet[2548]: I0212 19:17:22.071190 2548 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:17:22.074289 kubelet[2548]: I0212 19:17:22.074258 2548 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:17:22.250436 kubelet[2548]: E0212 19:17:22.250389 2548 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.2-a-f1f3323662\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:22.675302 kubelet[2548]: E0212 19:17:22.675268 2548 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.2-a-f1f3323662\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:22.887564 kubelet[2548]: E0212 19:17:22.885995 2548 kubelet.go:1802] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-f1f3323662\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-f1f3323662" Feb 12 19:17:23.444368 kubelet[2548]: I0212 19:17:23.444328 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-f1f3323662" podStartSLOduration=2.444280302 pod.CreationTimestamp="2024-02-12 19:17:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:23.070374122 +0000 UTC m=+2.120468143" watchObservedRunningTime="2024-02-12 19:17:23.444280302 +0000 UTC m=+2.494374283" Feb 12 19:17:23.844221 kubelet[2548]: I0212 19:17:23.844123 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-f1f3323662" podStartSLOduration=2.844085778 pod.CreationTimestamp="2024-02-12 19:17:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:23.444658541 +0000 UTC m=+2.494752562" watchObservedRunningTime="2024-02-12 19:17:23.844085778 +0000 UTC m=+2.894179799" Feb 12 19:17:23.844500 kubelet[2548]: I0212 19:17:23.844485 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-f1f3323662" podStartSLOduration=2.844460056 pod.CreationTimestamp="2024-02-12 19:17:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:23.844420777 +0000 UTC m=+2.894514758" watchObservedRunningTime="2024-02-12 19:17:23.844460056 +0000 UTC m=+2.894554077" Feb 12 19:17:24.675550 sudo[1752]: pam_unix(sudo:session): session closed for user root Feb 12 19:17:24.674000 audit[1752]: USER_END pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:17:24.674000 audit[1752]: CRED_DISP pid=1752 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:17:24.740004 sshd[1749]: pam_unix(sshd:session): session closed for user core Feb 12 19:17:24.739000 audit[1749]: USER_END pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:17:24.739000 audit[1749]: CRED_DISP pid=1749 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:17:24.743032 systemd-logind[1369]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:17:24.743199 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:17:24.743420 systemd[1]: session-9.scope: Consumed 4.693s CPU time. Feb 12 19:17:24.744121 systemd[1]: sshd@6-10.200.20.36:22-10.200.12.6:51412.service: Deactivated successfully. Feb 12 19:17:24.742000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.36:22-10.200.12.6:51412 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:24.745353 systemd-logind[1369]: Removed session 9. Feb 12 19:17:31.849000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:31.856418 kernel: kauditd_printk_skb: 255 callbacks suppressed Feb 12 19:17:31.856578 kernel: audit: type=1400 audit(1707765451.849:969): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:31.851000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:31.910186 kernel: audit: type=1400 audit(1707765451.851:970): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:31.942769 kernel: audit: type=1300 audit(1707765451.851:970): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40001a25a0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:31.851000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40001a25a0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:31.851000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:31.851000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:31.973451 kernel: audit: type=1327 audit(1707765451.851:970): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:31.851000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40001a26e0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:32.030129 kernel: audit: type=1400 audit(1707765451.851:971): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:32.030273 kernel: audit: type=1300 audit(1707765451.851:971): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40001a26e0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:31.851000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:32.056712 kernel: audit: type=1327 audit(1707765451.851:971): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:31.851000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:32.081910 kernel: audit: type=1400 audit(1707765451.851:972): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:31.851000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40001a2860 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:32.116477 kernel: audit: type=1300 audit(1707765451.851:972): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40001a2860 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:32.116598 kernel: audit: type=1327 audit(1707765451.851:972): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:31.851000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:31.849000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400120e380 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:31.849000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:34.722000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521291 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:17:34.722000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013ed440 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:17:34.722000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:35.021779 kubelet[2548]: I0212 19:17:35.021680 2548 kuberuntime_manager.go:1114] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:17:35.022145 env[1378]: time="2024-02-12T19:17:35.021989797Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:17:35.022311 kubelet[2548]: I0212 19:17:35.022145 2548 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:17:35.690745 kubelet[2548]: I0212 19:17:35.690709 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:35.695226 systemd[1]: Created slice kubepods-besteffort-pod5a2c34c4_8594_4838_a7fd_d3bc4d3fe654.slice. Feb 12 19:17:35.863892 kubelet[2548]: I0212 19:17:35.863862 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-spcl7\" (UniqueName: \"kubernetes.io/projected/5a2c34c4-8594-4838-a7fd-d3bc4d3fe654-kube-api-access-spcl7\") pod \"kube-proxy-4vd56\" (UID: \"5a2c34c4-8594-4838-a7fd-d3bc4d3fe654\") " pod="kube-system/kube-proxy-4vd56" Feb 12 19:17:35.864103 kubelet[2548]: I0212 19:17:35.864090 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/5a2c34c4-8594-4838-a7fd-d3bc4d3fe654-xtables-lock\") pod \"kube-proxy-4vd56\" (UID: \"5a2c34c4-8594-4838-a7fd-d3bc4d3fe654\") " pod="kube-system/kube-proxy-4vd56" Feb 12 19:17:35.864210 kubelet[2548]: I0212 19:17:35.864200 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/5a2c34c4-8594-4838-a7fd-d3bc4d3fe654-lib-modules\") pod \"kube-proxy-4vd56\" (UID: \"5a2c34c4-8594-4838-a7fd-d3bc4d3fe654\") " pod="kube-system/kube-proxy-4vd56" Feb 12 19:17:35.864321 kubelet[2548]: I0212 19:17:35.864311 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/5a2c34c4-8594-4838-a7fd-d3bc4d3fe654-kube-proxy\") pod \"kube-proxy-4vd56\" (UID: \"5a2c34c4-8594-4838-a7fd-d3bc4d3fe654\") " pod="kube-system/kube-proxy-4vd56" Feb 12 19:17:36.002515 env[1378]: time="2024-02-12T19:17:36.002113755Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4vd56,Uid:5a2c34c4-8594-4838-a7fd-d3bc4d3fe654,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:36.018594 kubelet[2548]: I0212 19:17:36.018552 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:36.024617 systemd[1]: Created slice kubepods-besteffort-pod7ea46876_2842_461b_b9fa_0184ea9afe00.slice. Feb 12 19:17:36.050165 env[1378]: time="2024-02-12T19:17:36.050086524Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:36.050539 env[1378]: time="2024-02-12T19:17:36.050512363Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:36.050641 env[1378]: time="2024-02-12T19:17:36.050620723Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:36.050897 env[1378]: time="2024-02-12T19:17:36.050870562Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/70bee3db225d5c8950e54bb3895db8f1097543d5d2326f304f832c32a89e3e20 pid=2653 runtime=io.containerd.runc.v2 Feb 12 19:17:36.065925 systemd[1]: run-containerd-runc-k8s.io-70bee3db225d5c8950e54bb3895db8f1097543d5d2326f304f832c32a89e3e20-runc.Fm8Onc.mount: Deactivated successfully. Feb 12 19:17:36.069362 systemd[1]: Started cri-containerd-70bee3db225d5c8950e54bb3895db8f1097543d5d2326f304f832c32a89e3e20.scope. Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit: BPF prog-id=107 op=LOAD Feb 12 19:17:36.077000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2653 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626565336462323235643563383935306535346262333839356462 Feb 12 19:17:36.077000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.077000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2653 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.077000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626565336462323235643563383935306535346262333839356462 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit: BPF prog-id=108 op=LOAD Feb 12 19:17:36.078000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2653 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626565336462323235643563383935306535346262333839356462 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit: BPF prog-id=109 op=LOAD Feb 12 19:17:36.078000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2653 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626565336462323235643563383935306535346262333839356462 Feb 12 19:17:36.078000 audit: BPF prog-id=109 op=UNLOAD Feb 12 19:17:36.078000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { perfmon } for pid=2663 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit[2663]: AVC avc: denied { bpf } for pid=2663 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.078000 audit: BPF prog-id=110 op=LOAD Feb 12 19:17:36.078000 audit[2663]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2653 pid=2663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.078000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730626565336462323235643563383935306535346262333839356462 Feb 12 19:17:36.090962 env[1378]: time="2024-02-12T19:17:36.090911357Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-4vd56,Uid:5a2c34c4-8594-4838-a7fd-d3bc4d3fe654,Namespace:kube-system,Attempt:0,} returns sandbox id \"70bee3db225d5c8950e54bb3895db8f1097543d5d2326f304f832c32a89e3e20\"" Feb 12 19:17:36.094307 env[1378]: time="2024-02-12T19:17:36.094049667Z" level=info msg="CreateContainer within sandbox \"70bee3db225d5c8950e54bb3895db8f1097543d5d2326f304f832c32a89e3e20\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:17:36.133797 env[1378]: time="2024-02-12T19:17:36.133746742Z" level=info msg="CreateContainer within sandbox \"70bee3db225d5c8950e54bb3895db8f1097543d5d2326f304f832c32a89e3e20\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"706b0465ba3ec1e80157cbbcb1f469bd57d819e6c362919358dc89d9430de771\"" Feb 12 19:17:36.135369 env[1378]: time="2024-02-12T19:17:36.134521420Z" level=info msg="StartContainer for \"706b0465ba3ec1e80157cbbcb1f469bd57d819e6c362919358dc89d9430de771\"" Feb 12 19:17:36.149967 systemd[1]: Started cri-containerd-706b0465ba3ec1e80157cbbcb1f469bd57d819e6c362919358dc89d9430de771.scope. Feb 12 19:17:36.167128 kubelet[2548]: I0212 19:17:36.166876 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7ea46876-2842-461b-b9fa-0184ea9afe00-var-lib-calico\") pod \"tigera-operator-cfc98749c-5dbwg\" (UID: \"7ea46876-2842-461b-b9fa-0184ea9afe00\") " pod="tigera-operator/tigera-operator-cfc98749c-5dbwg" Feb 12 19:17:36.167128 kubelet[2548]: I0212 19:17:36.166930 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-kwq4j\" (UniqueName: \"kubernetes.io/projected/7ea46876-2842-461b-b9fa-0184ea9afe00-kube-api-access-kwq4j\") pod \"tigera-operator-cfc98749c-5dbwg\" (UID: \"7ea46876-2842-461b-b9fa-0184ea9afe00\") " pod="tigera-operator/tigera-operator-cfc98749c-5dbwg" Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2653 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730366230343635626133656331653830313537636262636231663436 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit: BPF prog-id=111 op=LOAD Feb 12 19:17:36.173000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2653 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730366230343635626133656331653830313537636262636231663436 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit: BPF prog-id=112 op=LOAD Feb 12 19:17:36.173000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2653 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730366230343635626133656331653830313537636262636231663436 Feb 12 19:17:36.173000 audit: BPF prog-id=112 op=UNLOAD Feb 12 19:17:36.173000 audit: BPF prog-id=111 op=UNLOAD Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { perfmon } for pid=2696 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit[2696]: AVC avc: denied { bpf } for pid=2696 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.173000 audit: BPF prog-id=113 op=LOAD Feb 12 19:17:36.173000 audit[2696]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2653 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.173000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3730366230343635626133656331653830313537636262636231663436 Feb 12 19:17:36.192554 env[1378]: time="2024-02-12T19:17:36.192487519Z" level=info msg="StartContainer for \"706b0465ba3ec1e80157cbbcb1f469bd57d819e6c362919358dc89d9430de771\" returns successfully" Feb 12 19:17:36.230000 audit[2745]: NETFILTER_CFG table=mangle:62 family=10 entries=1 op=nft_register_chain pid=2745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.230000 audit[2745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc5958f40 a2=0 a3=ffffb0cc36c0 items=0 ppid=2707 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.230000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:17:36.232000 audit[2746]: NETFILTER_CFG table=nat:63 family=10 entries=1 op=nft_register_chain pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.232000 audit[2746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd693fda0 a2=0 a3=ffffa89ce6c0 items=0 ppid=2707 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:17:36.233000 audit[2747]: NETFILTER_CFG table=mangle:64 family=2 entries=1 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.233000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdafe5da0 a2=0 a3=ffffac3596c0 items=0 ppid=2707 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.233000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:17:36.234000 audit[2748]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.234000 audit[2748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc8bdc410 a2=0 a3=ffff9ff2b6c0 items=0 ppid=2707 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.234000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:17:36.235000 audit[2749]: NETFILTER_CFG table=filter:66 family=2 entries=1 op=nft_register_chain pid=2749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.235000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffce17e640 a2=0 a3=ffff877e46c0 items=0 ppid=2707 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.235000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:17:36.238000 audit[2750]: NETFILTER_CFG table=filter:67 family=10 entries=1 op=nft_register_chain pid=2750 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.238000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffcc83b3c0 a2=0 a3=ffffab8ca6c0 items=0 ppid=2707 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.238000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:17:36.329382 env[1378]: time="2024-02-12T19:17:36.329264970Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-5dbwg,Uid:7ea46876-2842-461b-b9fa-0184ea9afe00,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:17:36.333000 audit[2752]: NETFILTER_CFG table=filter:68 family=2 entries=1 op=nft_register_chain pid=2752 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.333000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffec0a3380 a2=0 a3=ffff92e196c0 items=0 ppid=2707 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:17:36.336000 audit[2754]: NETFILTER_CFG table=filter:69 family=2 entries=1 op=nft_register_rule pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.336000 audit[2754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd43a4e00 a2=0 a3=ffffa81076c0 items=0 ppid=2707 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:17:36.340000 audit[2757]: NETFILTER_CFG table=filter:70 family=2 entries=1 op=nft_register_rule pid=2757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.340000 audit[2757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffdc6eacf0 a2=0 a3=ffffb7eef6c0 items=0 ppid=2707 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.340000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:17:36.341000 audit[2758]: NETFILTER_CFG table=filter:71 family=2 entries=1 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.341000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffbb7e0e0 a2=0 a3=ffffa99146c0 items=0 ppid=2707 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.341000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:17:36.343000 audit[2760]: NETFILTER_CFG table=filter:72 family=2 entries=1 op=nft_register_rule pid=2760 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.343000 audit[2760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd6290210 a2=0 a3=ffffa2f236c0 items=0 ppid=2707 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:17:36.345000 audit[2761]: NETFILTER_CFG table=filter:73 family=2 entries=1 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.345000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc1da1bb0 a2=0 a3=ffffa11f76c0 items=0 ppid=2707 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.345000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:17:36.347000 audit[2763]: NETFILTER_CFG table=filter:74 family=2 entries=1 op=nft_register_rule pid=2763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.347000 audit[2763]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffd122f5a0 a2=0 a3=ffff848d46c0 items=0 ppid=2707 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:17:36.351000 audit[2766]: NETFILTER_CFG table=filter:75 family=2 entries=1 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.351000 audit[2766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffeae272c0 a2=0 a3=ffff898e06c0 items=0 ppid=2707 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.351000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:17:36.352000 audit[2767]: NETFILTER_CFG table=filter:76 family=2 entries=1 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.352000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffb3ab500 a2=0 a3=ffff95f3a6c0 items=0 ppid=2707 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:17:36.355000 audit[2769]: NETFILTER_CFG table=filter:77 family=2 entries=1 op=nft_register_rule pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.355000 audit[2769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffffc6d100 a2=0 a3=ffffaa2796c0 items=0 ppid=2707 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:17:36.356000 audit[2770]: NETFILTER_CFG table=filter:78 family=2 entries=1 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.356000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe8f22490 a2=0 a3=ffff960ed6c0 items=0 ppid=2707 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.356000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:17:36.361000 audit[2776]: NETFILTER_CFG table=filter:79 family=2 entries=1 op=nft_register_rule pid=2776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.361000 audit[2776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffbf3caf0 a2=0 a3=ffffa83876c0 items=0 ppid=2707 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.361000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:17:36.365119 env[1378]: time="2024-02-12T19:17:36.365024098Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:36.365119 env[1378]: time="2024-02-12T19:17:36.365081018Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:36.365267 env[1378]: time="2024-02-12T19:17:36.365128098Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:36.365372 env[1378]: time="2024-02-12T19:17:36.365346537Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7f163538412835a84279837dedbb89142f437c4863763f4e1e648bd522825069 pid=2781 runtime=io.containerd.runc.v2 Feb 12 19:17:36.366000 audit[2794]: NETFILTER_CFG table=filter:80 family=2 entries=1 op=nft_register_rule pid=2794 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.366000 audit[2794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe8c90ac0 a2=0 a3=ffff97e3b6c0 items=0 ppid=2707 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.366000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:17:36.370000 audit[2803]: NETFILTER_CFG table=filter:81 family=2 entries=1 op=nft_register_rule pid=2803 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.370000 audit[2803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff7354890 a2=0 a3=ffffaed136c0 items=0 ppid=2707 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:17:36.372000 audit[2806]: NETFILTER_CFG table=nat:82 family=2 entries=1 op=nft_register_chain pid=2806 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.372000 audit[2806]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffc53aa170 a2=0 a3=ffffa73d46c0 items=0 ppid=2707 pid=2806 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:17:36.376833 systemd[1]: Started cri-containerd-7f163538412835a84279837dedbb89142f437c4863763f4e1e648bd522825069.scope. Feb 12 19:17:36.377000 audit[2809]: NETFILTER_CFG table=nat:83 family=2 entries=1 op=nft_register_rule pid=2809 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.377000 audit[2809]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffd6b8e6e0 a2=0 a3=ffff8ae2c6c0 items=0 ppid=2707 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.377000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:17:36.383000 audit[2812]: NETFILTER_CFG table=nat:84 family=2 entries=1 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.383000 audit[2812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffed1483c0 a2=0 a3=ffff9e5e86c0 items=0 ppid=2707 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.383000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.393000 audit: BPF prog-id=114 op=LOAD Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400014db38 a2=10 a3=0 items=0 ppid=2781 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766313633353338343132383335613834323739383337646564626238 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400014d5a0 a2=3c a3=0 items=0 ppid=2781 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766313633353338343132383335613834323739383337646564626238 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit: BPF prog-id=115 op=LOAD Feb 12 19:17:36.394000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014d8e0 a2=78 a3=0 items=0 ppid=2781 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766313633353338343132383335613834323739383337646564626238 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit: BPF prog-id=116 op=LOAD Feb 12 19:17:36.394000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400014d670 a2=78 a3=0 items=0 ppid=2781 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766313633353338343132383335613834323739383337646564626238 Feb 12 19:17:36.394000 audit: BPF prog-id=116 op=UNLOAD Feb 12 19:17:36.394000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { perfmon } for pid=2793 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit[2793]: AVC avc: denied { bpf } for pid=2793 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.394000 audit: BPF prog-id=117 op=LOAD Feb 12 19:17:36.394000 audit[2793]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400014db40 a2=78 a3=0 items=0 ppid=2781 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766313633353338343132383335613834323739383337646564626238 Feb 12 19:17:36.416697 env[1378]: time="2024-02-12T19:17:36.416653737Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-cfc98749c-5dbwg,Uid:7ea46876-2842-461b-b9fa-0184ea9afe00,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"7f163538412835a84279837dedbb89142f437c4863763f4e1e648bd522825069\"" Feb 12 19:17:36.419941 env[1378]: time="2024-02-12T19:17:36.419625767Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:17:36.435000 audit[2823]: NETFILTER_CFG table=filter:85 family=2 entries=6 op=nft_register_rule pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:36.435000 audit[2823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffd43afe10 a2=0 a3=ffff89cbb6c0 items=0 ppid=2707 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:36.473000 audit[2823]: NETFILTER_CFG table=nat:86 family=2 entries=17 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:36.473000 audit[2823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd43afe10 a2=0 a3=ffff89cbb6c0 items=0 ppid=2707 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:36.479000 audit[2833]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2833 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.479000 audit[2833]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=fffff537eb70 a2=0 a3=ffffaed6d6c0 items=0 ppid=2707 pid=2833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.479000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:17:36.481000 audit[2835]: NETFILTER_CFG table=filter:88 family=10 entries=2 op=nft_register_chain pid=2835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.481000 audit[2835]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffc619e810 a2=0 a3=ffffa8e7b6c0 items=0 ppid=2707 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.481000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:17:36.484000 audit[2838]: NETFILTER_CFG table=filter:89 family=10 entries=2 op=nft_register_chain pid=2838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.484000 audit[2838]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe86b5310 a2=0 a3=ffff8ed6b6c0 items=0 ppid=2707 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:17:36.485000 audit[2839]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_chain pid=2839 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.485000 audit[2839]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdf3bbf80 a2=0 a3=ffff9de136c0 items=0 ppid=2707 pid=2839 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:17:36.487000 audit[2841]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.487000 audit[2841]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc22a2260 a2=0 a3=ffff9691e6c0 items=0 ppid=2707 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.487000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:17:36.488000 audit[2842]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_chain pid=2842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.488000 audit[2842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff0b79d40 a2=0 a3=ffffbb9b16c0 items=0 ppid=2707 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:17:36.490000 audit[2844]: NETFILTER_CFG table=filter:93 family=10 entries=1 op=nft_register_rule pid=2844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.490000 audit[2844]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffff979570 a2=0 a3=ffffaf9c96c0 items=0 ppid=2707 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.490000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:17:36.493000 audit[2847]: NETFILTER_CFG table=filter:94 family=10 entries=2 op=nft_register_chain pid=2847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.493000 audit[2847]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffd45c8b10 a2=0 a3=ffff9a8f36c0 items=0 ppid=2707 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.493000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:17:36.494000 audit[2848]: NETFILTER_CFG table=filter:95 family=10 entries=1 op=nft_register_chain pid=2848 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.494000 audit[2848]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd949b1d0 a2=0 a3=ffff90c966c0 items=0 ppid=2707 pid=2848 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:17:36.496000 audit[2850]: NETFILTER_CFG table=filter:96 family=10 entries=1 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.496000 audit[2850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc9a5f0b0 a2=0 a3=ffff901246c0 items=0 ppid=2707 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.496000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:17:36.497000 audit[2851]: NETFILTER_CFG table=filter:97 family=10 entries=1 op=nft_register_chain pid=2851 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.497000 audit[2851]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf28c830 a2=0 a3=ffff81fd76c0 items=0 ppid=2707 pid=2851 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:17:36.499000 audit[2853]: NETFILTER_CFG table=filter:98 family=10 entries=1 op=nft_register_rule pid=2853 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.499000 audit[2853]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd1644640 a2=0 a3=ffffbee186c0 items=0 ppid=2707 pid=2853 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:17:36.502000 audit[2856]: NETFILTER_CFG table=filter:99 family=10 entries=1 op=nft_register_rule pid=2856 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.502000 audit[2856]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffca406010 a2=0 a3=ffff869246c0 items=0 ppid=2707 pid=2856 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.502000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:17:36.504000 audit[2859]: NETFILTER_CFG table=filter:100 family=10 entries=1 op=nft_register_rule pid=2859 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.504000 audit[2859]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe80062f0 a2=0 a3=ffffafddf6c0 items=0 ppid=2707 pid=2859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.504000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:17:36.505000 audit[2860]: NETFILTER_CFG table=nat:101 family=10 entries=1 op=nft_register_chain pid=2860 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.505000 audit[2860]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe67dc320 a2=0 a3=ffff998216c0 items=0 ppid=2707 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.505000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:17:36.508000 audit[2862]: NETFILTER_CFG table=nat:102 family=10 entries=2 op=nft_register_chain pid=2862 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.508000 audit[2862]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd15b8870 a2=0 a3=ffff999a16c0 items=0 ppid=2707 pid=2862 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.508000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:17:36.510000 audit[2865]: NETFILTER_CFG table=nat:103 family=10 entries=2 op=nft_register_chain pid=2865 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.510000 audit[2865]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffd0162150 a2=0 a3=ffffad6226c0 items=0 ppid=2707 pid=2865 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:17:36.515000 audit[2869]: NETFILTER_CFG table=filter:104 family=10 entries=3 op=nft_register_rule pid=2869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:17:36.515000 audit[2869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff553bae0 a2=0 a3=ffff8e4896c0 items=0 ppid=2707 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.515000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:36.515000 audit[2869]: NETFILTER_CFG table=nat:105 family=10 entries=10 op=nft_register_chain pid=2869 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:17:36.515000 audit[2869]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=fffff553bae0 a2=0 a3=ffff8e4896c0 items=0 ppid=2707 pid=2869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.515000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:38.807297 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount791529234.mount: Deactivated successfully. Feb 12 19:17:39.643734 env[1378]: time="2024-02-12T19:17:39.643685655Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:39.654677 env[1378]: time="2024-02-12T19:17:39.654629222Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:39.659017 env[1378]: time="2024-02-12T19:17:39.658984729Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:39.664854 env[1378]: time="2024-02-12T19:17:39.664825312Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:39.665399 env[1378]: time="2024-02-12T19:17:39.665371310Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 12 19:17:39.668564 env[1378]: time="2024-02-12T19:17:39.668269662Z" level=info msg="CreateContainer within sandbox \"7f163538412835a84279837dedbb89142f437c4863763f4e1e648bd522825069\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:17:39.719889 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3600265878.mount: Deactivated successfully. Feb 12 19:17:39.739214 env[1378]: time="2024-02-12T19:17:39.739164051Z" level=info msg="CreateContainer within sandbox \"7f163538412835a84279837dedbb89142f437c4863763f4e1e648bd522825069\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"64a298a80922727a0d03da0ea7f9d8ad32314a29cd30ccfd1f59d1c13c7499af\"" Feb 12 19:17:39.739753 env[1378]: time="2024-02-12T19:17:39.739728969Z" level=info msg="StartContainer for \"64a298a80922727a0d03da0ea7f9d8ad32314a29cd30ccfd1f59d1c13c7499af\"" Feb 12 19:17:39.755865 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1602687841.mount: Deactivated successfully. Feb 12 19:17:39.762461 systemd[1]: Started cri-containerd-64a298a80922727a0d03da0ea7f9d8ad32314a29cd30ccfd1f59d1c13c7499af.scope. Feb 12 19:17:39.799138 kernel: kauditd_printk_skb: 294 callbacks suppressed Feb 12 19:17:39.799281 kernel: audit: type=1400 audit(1707765459.772:1060): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.818760 kernel: audit: type=1400 audit(1707765459.772:1061): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.841414 kernel: audit: type=1400 audit(1707765459.772:1062): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.863187 kernel: audit: type=1400 audit(1707765459.772:1063): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.891194 kernel: audit: type=1400 audit(1707765459.772:1064): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.914894 kernel: audit: type=1400 audit(1707765459.772:1065): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.937246 kernel: audit: type=1400 audit(1707765459.772:1066): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.979813 kernel: audit: type=1400 audit(1707765459.772:1067): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.979923 kernel: audit: type=1400 audit(1707765459.772:1068): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.979944 env[1378]: time="2024-02-12T19:17:39.958823478Z" level=info msg="StartContainer for \"64a298a80922727a0d03da0ea7f9d8ad32314a29cd30ccfd1f59d1c13c7499af\" returns successfully" Feb 12 19:17:39.772000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit: BPF prog-id=118 op=LOAD Feb 12 19:17:40.002484 kernel: audit: type=1400 audit(1707765459.772:1069): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2781 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613239386138303932323732376130643033646130656137663964 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2781 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613239386138303932323732376130643033646130656137663964 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.772000 audit: BPF prog-id=119 op=LOAD Feb 12 19:17:39.772000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2781 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.772000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613239386138303932323732376130643033646130656137663964 Feb 12 19:17:39.778000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.778000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.778000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.778000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.778000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.778000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.778000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.778000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.778000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.778000 audit: BPF prog-id=120 op=LOAD Feb 12 19:17:39.778000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2781 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613239386138303932323732376130643033646130656137663964 Feb 12 19:17:39.798000 audit: BPF prog-id=120 op=UNLOAD Feb 12 19:17:39.798000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { perfmon } for pid=2878 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit[2878]: AVC avc: denied { bpf } for pid=2878 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.798000 audit: BPF prog-id=121 op=LOAD Feb 12 19:17:39.798000 audit[2878]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2781 pid=2878 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.798000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3634613239386138303932323732376130643033646130656137663964 Feb 12 19:17:40.266645 kubelet[2548]: I0212 19:17:40.266606 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-4vd56" podStartSLOduration=5.266566936 pod.CreationTimestamp="2024-02-12 19:17:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:36.282365877 +0000 UTC m=+15.332459898" watchObservedRunningTime="2024-02-12 19:17:40.266566936 +0000 UTC m=+19.316660957" Feb 12 19:17:41.210112 kubelet[2548]: I0212 19:17:41.210061 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-cfc98749c-5dbwg" podStartSLOduration=-9.22337203064475e+09 pod.CreationTimestamp="2024-02-12 19:17:35 +0000 UTC" firstStartedPulling="2024-02-12 19:17:36.417879173 +0000 UTC m=+15.467973194" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:40.266897255 +0000 UTC m=+19.316991276" watchObservedRunningTime="2024-02-12 19:17:41.210025426 +0000 UTC m=+20.260119447" Feb 12 19:17:44.247000 audit[2937]: NETFILTER_CFG table=filter:106 family=2 entries=13 op=nft_register_rule pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:44.247000 audit[2937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffc97fa1f0 a2=0 a3=ffff821576c0 items=0 ppid=2707 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:44.247000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:44.248000 audit[2937]: NETFILTER_CFG table=nat:107 family=2 entries=20 op=nft_register_rule pid=2937 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:44.248000 audit[2937]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc97fa1f0 a2=0 a3=ffff821576c0 items=0 ppid=2707 pid=2937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:44.248000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:44.280000 audit[2963]: NETFILTER_CFG table=filter:108 family=2 entries=14 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:44.280000 audit[2963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffc0617a80 a2=0 a3=ffff9229b6c0 items=0 ppid=2707 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:44.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:44.281000 audit[2963]: NETFILTER_CFG table=nat:109 family=2 entries=20 op=nft_register_rule pid=2963 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:44.281000 audit[2963]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffc0617a80 a2=0 a3=ffff9229b6c0 items=0 ppid=2707 pid=2963 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:44.281000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:44.375867 kubelet[2548]: I0212 19:17:44.375816 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:44.381016 systemd[1]: Created slice kubepods-besteffort-pod6a9f3770_cae2_495f_8ac7_882e1f15e32e.slice. Feb 12 19:17:44.440837 kubelet[2548]: I0212 19:17:44.440787 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:44.445821 systemd[1]: Created slice kubepods-besteffort-poddfb679b1_bcec_4621_8b4b_119ceb97924c.slice. Feb 12 19:17:44.529698 kubelet[2548]: I0212 19:17:44.529598 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/6a9f3770-cae2-495f-8ac7-882e1f15e32e-typha-certs\") pod \"calico-typha-7468cccd88-rb89v\" (UID: \"6a9f3770-cae2-495f-8ac7-882e1f15e32e\") " pod="calico-system/calico-typha-7468cccd88-rb89v" Feb 12 19:17:44.529883 kubelet[2548]: I0212 19:17:44.529868 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/6a9f3770-cae2-495f-8ac7-882e1f15e32e-tigera-ca-bundle\") pod \"calico-typha-7468cccd88-rb89v\" (UID: \"6a9f3770-cae2-495f-8ac7-882e1f15e32e\") " pod="calico-system/calico-typha-7468cccd88-rb89v" Feb 12 19:17:44.529971 kubelet[2548]: I0212 19:17:44.529961 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mc96k\" (UniqueName: \"kubernetes.io/projected/6a9f3770-cae2-495f-8ac7-882e1f15e32e-kube-api-access-mc96k\") pod \"calico-typha-7468cccd88-rb89v\" (UID: \"6a9f3770-cae2-495f-8ac7-882e1f15e32e\") " pod="calico-system/calico-typha-7468cccd88-rb89v" Feb 12 19:17:44.562460 kubelet[2548]: I0212 19:17:44.562423 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:44.562740 kubelet[2548]: E0212 19:17:44.562715 2548 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tgqqb" podUID=f43d848e-34cb-4479-97c9-1f49a005d06d Feb 12 19:17:44.630983 kubelet[2548]: I0212 19:17:44.630936 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/dfb679b1-bcec-4621-8b4b-119ceb97924c-cni-net-dir\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.630983 kubelet[2548]: I0212 19:17:44.630989 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-9c9h6\" (UniqueName: \"kubernetes.io/projected/dfb679b1-bcec-4621-8b4b-119ceb97924c-kube-api-access-9c9h6\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631149 kubelet[2548]: I0212 19:17:44.631015 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/dfb679b1-bcec-4621-8b4b-119ceb97924c-flexvol-driver-host\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631149 kubelet[2548]: I0212 19:17:44.631048 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/dfb679b1-bcec-4621-8b4b-119ceb97924c-xtables-lock\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631149 kubelet[2548]: I0212 19:17:44.631071 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/dfb679b1-bcec-4621-8b4b-119ceb97924c-tigera-ca-bundle\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631149 kubelet[2548]: I0212 19:17:44.631092 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/dfb679b1-bcec-4621-8b4b-119ceb97924c-var-lib-calico\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631149 kubelet[2548]: I0212 19:17:44.631141 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/dfb679b1-bcec-4621-8b4b-119ceb97924c-var-run-calico\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631265 kubelet[2548]: I0212 19:17:44.631171 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/dfb679b1-bcec-4621-8b4b-119ceb97924c-cni-bin-dir\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631265 kubelet[2548]: I0212 19:17:44.631199 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/dfb679b1-bcec-4621-8b4b-119ceb97924c-policysync\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631265 kubelet[2548]: I0212 19:17:44.631223 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/dfb679b1-bcec-4621-8b4b-119ceb97924c-cni-log-dir\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631265 kubelet[2548]: I0212 19:17:44.631243 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/dfb679b1-bcec-4621-8b4b-119ceb97924c-lib-modules\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.631349 kubelet[2548]: I0212 19:17:44.631261 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/dfb679b1-bcec-4621-8b4b-119ceb97924c-node-certs\") pod \"calico-node-8k2w2\" (UID: \"dfb679b1-bcec-4621-8b4b-119ceb97924c\") " pod="calico-system/calico-node-8k2w2" Feb 12 19:17:44.732443 kubelet[2548]: I0212 19:17:44.732390 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/f43d848e-34cb-4479-97c9-1f49a005d06d-kubelet-dir\") pod \"csi-node-driver-tgqqb\" (UID: \"f43d848e-34cb-4479-97c9-1f49a005d06d\") " pod="calico-system/csi-node-driver-tgqqb" Feb 12 19:17:44.732655 kubelet[2548]: I0212 19:17:44.732473 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/f43d848e-34cb-4479-97c9-1f49a005d06d-varrun\") pod \"csi-node-driver-tgqqb\" (UID: \"f43d848e-34cb-4479-97c9-1f49a005d06d\") " pod="calico-system/csi-node-driver-tgqqb" Feb 12 19:17:44.732655 kubelet[2548]: I0212 19:17:44.732509 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/f43d848e-34cb-4479-97c9-1f49a005d06d-socket-dir\") pod \"csi-node-driver-tgqqb\" (UID: \"f43d848e-34cb-4479-97c9-1f49a005d06d\") " pod="calico-system/csi-node-driver-tgqqb" Feb 12 19:17:44.732655 kubelet[2548]: I0212 19:17:44.732565 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rtgp9\" (UniqueName: \"kubernetes.io/projected/f43d848e-34cb-4479-97c9-1f49a005d06d-kube-api-access-rtgp9\") pod \"csi-node-driver-tgqqb\" (UID: \"f43d848e-34cb-4479-97c9-1f49a005d06d\") " pod="calico-system/csi-node-driver-tgqqb" Feb 12 19:17:44.732655 kubelet[2548]: I0212 19:17:44.732618 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/f43d848e-34cb-4479-97c9-1f49a005d06d-registration-dir\") pod \"csi-node-driver-tgqqb\" (UID: \"f43d848e-34cb-4479-97c9-1f49a005d06d\") " pod="calico-system/csi-node-driver-tgqqb" Feb 12 19:17:44.733773 kubelet[2548]: E0212 19:17:44.733748 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.733773 kubelet[2548]: W0212 19:17:44.733766 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.733894 kubelet[2548]: E0212 19:17:44.733793 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.738551 kubelet[2548]: E0212 19:17:44.738525 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.738551 kubelet[2548]: W0212 19:17:44.738543 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.738700 kubelet[2548]: E0212 19:17:44.738570 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.739497 kubelet[2548]: E0212 19:17:44.739481 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.739603 kubelet[2548]: W0212 19:17:44.739590 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.739680 kubelet[2548]: E0212 19:17:44.739671 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.739925 kubelet[2548]: E0212 19:17:44.739914 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.740013 kubelet[2548]: W0212 19:17:44.740002 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.740084 kubelet[2548]: E0212 19:17:44.740076 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.741176 kubelet[2548]: E0212 19:17:44.741159 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.741322 kubelet[2548]: W0212 19:17:44.741308 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.741521 kubelet[2548]: E0212 19:17:44.741510 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.741685 kubelet[2548]: E0212 19:17:44.741675 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.741770 kubelet[2548]: W0212 19:17:44.741759 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.741911 kubelet[2548]: E0212 19:17:44.741892 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.742069 kubelet[2548]: E0212 19:17:44.742059 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.742140 kubelet[2548]: W0212 19:17:44.742129 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.742277 kubelet[2548]: E0212 19:17:44.742268 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.742417 kubelet[2548]: E0212 19:17:44.742394 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.742502 kubelet[2548]: W0212 19:17:44.742489 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.742600 kubelet[2548]: E0212 19:17:44.742584 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.742797 kubelet[2548]: E0212 19:17:44.742785 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.742879 kubelet[2548]: W0212 19:17:44.742868 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.742959 kubelet[2548]: E0212 19:17:44.742940 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.743401 kubelet[2548]: E0212 19:17:44.743386 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.743497 kubelet[2548]: W0212 19:17:44.743484 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.743606 kubelet[2548]: E0212 19:17:44.743588 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.743819 kubelet[2548]: E0212 19:17:44.743806 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.743899 kubelet[2548]: W0212 19:17:44.743888 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.743981 kubelet[2548]: E0212 19:17:44.743964 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.744769 kubelet[2548]: E0212 19:17:44.744750 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.744854 kubelet[2548]: W0212 19:17:44.744843 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.745008 kubelet[2548]: E0212 19:17:44.744998 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.745131 kubelet[2548]: E0212 19:17:44.745122 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.745192 kubelet[2548]: W0212 19:17:44.745182 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.745272 kubelet[2548]: E0212 19:17:44.745254 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.745509 kubelet[2548]: E0212 19:17:44.745495 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.745597 kubelet[2548]: W0212 19:17:44.745585 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.745683 kubelet[2548]: E0212 19:17:44.745664 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.745893 kubelet[2548]: E0212 19:17:44.745881 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.745963 kubelet[2548]: W0212 19:17:44.745952 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.746043 kubelet[2548]: E0212 19:17:44.746028 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.746229 kubelet[2548]: E0212 19:17:44.746217 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.746306 kubelet[2548]: W0212 19:17:44.746294 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.746389 kubelet[2548]: E0212 19:17:44.746372 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.746744 kubelet[2548]: E0212 19:17:44.746730 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.746825 kubelet[2548]: W0212 19:17:44.746813 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.746908 kubelet[2548]: E0212 19:17:44.746890 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.747104 kubelet[2548]: E0212 19:17:44.747092 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.747172 kubelet[2548]: W0212 19:17:44.747161 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.747267 kubelet[2548]: E0212 19:17:44.747248 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.747481 kubelet[2548]: E0212 19:17:44.747459 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.747563 kubelet[2548]: W0212 19:17:44.747550 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.747650 kubelet[2548]: E0212 19:17:44.747630 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.748050 kubelet[2548]: E0212 19:17:44.748037 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.748131 kubelet[2548]: W0212 19:17:44.748120 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.748213 kubelet[2548]: E0212 19:17:44.748196 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.748569 kubelet[2548]: E0212 19:17:44.748553 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.748667 kubelet[2548]: W0212 19:17:44.748654 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.748763 kubelet[2548]: E0212 19:17:44.748743 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.749019 kubelet[2548]: E0212 19:17:44.749005 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.749100 kubelet[2548]: W0212 19:17:44.749088 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.749193 kubelet[2548]: E0212 19:17:44.749174 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.749505 kubelet[2548]: E0212 19:17:44.749489 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.749583 kubelet[2548]: W0212 19:17:44.749570 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.749835 kubelet[2548]: E0212 19:17:44.749820 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.749921 kubelet[2548]: W0212 19:17:44.749901 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.749978 kubelet[2548]: E0212 19:17:44.749969 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.750049 kubelet[2548]: E0212 19:17:44.750039 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.798567 kubelet[2548]: E0212 19:17:44.798482 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.798567 kubelet[2548]: W0212 19:17:44.798503 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.798567 kubelet[2548]: E0212 19:17:44.798523 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.833719 kubelet[2548]: E0212 19:17:44.833682 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.833719 kubelet[2548]: W0212 19:17:44.833708 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.833719 kubelet[2548]: E0212 19:17:44.833729 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.834182 kubelet[2548]: E0212 19:17:44.834162 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.834182 kubelet[2548]: W0212 19:17:44.834176 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.834261 kubelet[2548]: E0212 19:17:44.834190 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.834447 kubelet[2548]: E0212 19:17:44.834426 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.834447 kubelet[2548]: W0212 19:17:44.834441 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.834534 kubelet[2548]: E0212 19:17:44.834458 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.834701 kubelet[2548]: E0212 19:17:44.834681 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.834701 kubelet[2548]: W0212 19:17:44.834696 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.834786 kubelet[2548]: E0212 19:17:44.834713 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.834925 kubelet[2548]: E0212 19:17:44.834905 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.834925 kubelet[2548]: W0212 19:17:44.834919 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.835006 kubelet[2548]: E0212 19:17:44.834930 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.835197 kubelet[2548]: E0212 19:17:44.835183 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.835197 kubelet[2548]: W0212 19:17:44.835193 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.835272 kubelet[2548]: E0212 19:17:44.835223 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.835489 kubelet[2548]: E0212 19:17:44.835472 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.835489 kubelet[2548]: W0212 19:17:44.835484 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.835585 kubelet[2548]: E0212 19:17:44.835519 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.835749 kubelet[2548]: E0212 19:17:44.835728 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.835808 kubelet[2548]: W0212 19:17:44.835752 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.835874 kubelet[2548]: E0212 19:17:44.835845 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.836569 kubelet[2548]: E0212 19:17:44.836544 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.836569 kubelet[2548]: W0212 19:17:44.836564 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.836668 kubelet[2548]: E0212 19:17:44.836582 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.840437 kubelet[2548]: E0212 19:17:44.836817 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.840437 kubelet[2548]: W0212 19:17:44.836829 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.840437 kubelet[2548]: E0212 19:17:44.836885 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.840437 kubelet[2548]: E0212 19:17:44.837035 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.840437 kubelet[2548]: W0212 19:17:44.837043 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.840437 kubelet[2548]: E0212 19:17:44.837118 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.846026 kubelet[2548]: E0212 19:17:44.846001 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.846026 kubelet[2548]: W0212 19:17:44.846021 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.846158 kubelet[2548]: E0212 19:17:44.846064 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.846272 kubelet[2548]: E0212 19:17:44.846258 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.846272 kubelet[2548]: W0212 19:17:44.846269 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.846336 kubelet[2548]: E0212 19:17:44.846299 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.846486 kubelet[2548]: E0212 19:17:44.846472 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.846486 kubelet[2548]: W0212 19:17:44.846483 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.846574 kubelet[2548]: E0212 19:17:44.846558 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.846723 kubelet[2548]: E0212 19:17:44.846696 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.846723 kubelet[2548]: W0212 19:17:44.846721 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.846808 kubelet[2548]: E0212 19:17:44.846799 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.846996 kubelet[2548]: E0212 19:17:44.846982 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.846996 kubelet[2548]: W0212 19:17:44.846992 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.847075 kubelet[2548]: E0212 19:17:44.847040 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.847265 kubelet[2548]: E0212 19:17:44.847172 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.847265 kubelet[2548]: W0212 19:17:44.847195 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.847265 kubelet[2548]: E0212 19:17:44.847210 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.848178 kubelet[2548]: E0212 19:17:44.847527 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.848178 kubelet[2548]: W0212 19:17:44.847540 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.848178 kubelet[2548]: E0212 19:17:44.847552 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.852480 kubelet[2548]: E0212 19:17:44.852455 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.852480 kubelet[2548]: W0212 19:17:44.852470 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.852623 kubelet[2548]: E0212 19:17:44.852609 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.853675 kubelet[2548]: E0212 19:17:44.853649 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.853675 kubelet[2548]: W0212 19:17:44.853667 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.853841 kubelet[2548]: E0212 19:17:44.853810 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.853841 kubelet[2548]: W0212 19:17:44.853837 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.853993 kubelet[2548]: E0212 19:17:44.853977 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.853993 kubelet[2548]: W0212 19:17:44.853989 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.854100 kubelet[2548]: E0212 19:17:44.854085 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.854100 kubelet[2548]: W0212 19:17:44.854095 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.854160 kubelet[2548]: E0212 19:17:44.854106 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.854260 kubelet[2548]: E0212 19:17:44.854241 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.854260 kubelet[2548]: W0212 19:17:44.854253 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.854362 kubelet[2548]: E0212 19:17:44.854262 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.854362 kubelet[2548]: E0212 19:17:44.854280 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.854429 kubelet[2548]: E0212 19:17:44.854418 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.854456 kubelet[2548]: W0212 19:17:44.854431 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.854456 kubelet[2548]: E0212 19:17:44.854442 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.854532 kubelet[2548]: E0212 19:17:44.854515 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.854714 kubelet[2548]: E0212 19:17:44.854695 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.854714 kubelet[2548]: W0212 19:17:44.854708 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.854775 kubelet[2548]: E0212 19:17:44.854721 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.854775 kubelet[2548]: E0212 19:17:44.854736 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.936241 kubelet[2548]: E0212 19:17:44.936217 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.936441 kubelet[2548]: W0212 19:17:44.936424 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.936518 kubelet[2548]: E0212 19:17:44.936508 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.936868 kubelet[2548]: E0212 19:17:44.936855 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.936958 kubelet[2548]: W0212 19:17:44.936947 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.937019 kubelet[2548]: E0212 19:17:44.937010 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:44.984261 env[1378]: time="2024-02-12T19:17:44.983844796Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7468cccd88-rb89v,Uid:6a9f3770-cae2-495f-8ac7-882e1f15e32e,Namespace:calico-system,Attempt:0,}" Feb 12 19:17:44.992683 kubelet[2548]: E0212 19:17:44.992650 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:44.992857 kubelet[2548]: W0212 19:17:44.992840 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:44.992944 kubelet[2548]: E0212 19:17:44.992933 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:45.027813 env[1378]: time="2024-02-12T19:17:45.027724397Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:45.030484 env[1378]: time="2024-02-12T19:17:45.027777676Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:45.030484 env[1378]: time="2024-02-12T19:17:45.028516354Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:45.030650 env[1378]: time="2024-02-12T19:17:45.030603869Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/24a02642441c1ae2272f172f6fecffb8563bbbb73bbcc3b8ecb2d37c471961cf pid=3031 runtime=io.containerd.runc.v2 Feb 12 19:17:45.037722 kubelet[2548]: E0212 19:17:45.037692 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:45.037722 kubelet[2548]: W0212 19:17:45.037711 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:45.037722 kubelet[2548]: E0212 19:17:45.037731 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:45.044484 systemd[1]: Started cri-containerd-24a02642441c1ae2272f172f6fecffb8563bbbb73bbcc3b8ecb2d37c471961cf.scope. Feb 12 19:17:45.048928 env[1378]: time="2024-02-12T19:17:45.048827300Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8k2w2,Uid:dfb679b1-bcec-4621-8b4b-119ceb97924c,Namespace:calico-system,Attempt:0,}" Feb 12 19:17:45.077547 kernel: kauditd_printk_skb: 59 callbacks suppressed Feb 12 19:17:45.077663 kernel: audit: type=1400 audit(1707765465.070:1082): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.118349 kernel: audit: type=1400 audit(1707765465.070:1083): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.137962 kernel: audit: type=1400 audit(1707765465.070:1084): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.140493 kubelet[2548]: E0212 19:17:45.139629 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:45.140493 kubelet[2548]: W0212 19:17:45.139660 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:45.140493 kubelet[2548]: E0212 19:17:45.139681 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.163775 kernel: audit: type=1400 audit(1707765465.070:1085): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.192971 kernel: audit: type=1400 audit(1707765465.070:1086): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.215651 kernel: audit: type=1400 audit(1707765465.070:1087): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.217746 env[1378]: time="2024-02-12T19:17:45.216667726Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7468cccd88-rb89v,Uid:6a9f3770-cae2-495f-8ac7-882e1f15e32e,Namespace:calico-system,Attempt:0,} returns sandbox id \"24a02642441c1ae2272f172f6fecffb8563bbbb73bbcc3b8ecb2d37c471961cf\"" Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.240784 kernel: audit: type=1400 audit(1707765465.070:1088): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.244130 kubelet[2548]: E0212 19:17:45.244109 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:45.244638 env[1378]: time="2024-02-12T19:17:45.244603611Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:17:45.245836 kubelet[2548]: W0212 19:17:45.245810 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:45.247892 kubelet[2548]: E0212 19:17:45.247870 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.249939 kubelet[2548]: E0212 19:17:45.249926 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:45.250269 kubelet[2548]: W0212 19:17:45.250238 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:45.250385 kubelet[2548]: E0212 19:17:45.250372 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:45.271824 kernel: audit: type=1400 audit(1707765465.070:1089): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.278204 env[1378]: time="2024-02-12T19:17:45.274279970Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:45.278204 env[1378]: time="2024-02-12T19:17:45.274317210Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:45.278204 env[1378]: time="2024-02-12T19:17:45.274327570Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:45.278204 env[1378]: time="2024-02-12T19:17:45.274453090Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b8e86b1f43b1314aecd1ac6d6cc61352281851b7323f72cc338160762d99d24e pid=3077 runtime=io.containerd.runc.v2 Feb 12 19:17:45.296118 kernel: audit: type=1400 audit(1707765465.070:1090): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.070000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.322180 kernel: audit: type=1400 audit(1707765465.070:1091): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.070000 audit: BPF prog-id=122 op=LOAD Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3031 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613032363432343431633161653232373266313732663666656366 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3031 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613032363432343431633161653232373266313732663666656366 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.076000 audit: BPF prog-id=123 op=LOAD Feb 12 19:17:45.076000 audit[3043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3031 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.076000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613032363432343431633161653232373266313732663666656366 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit: BPF prog-id=124 op=LOAD Feb 12 19:17:45.096000 audit[3043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3031 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613032363432343431633161653232373266313732663666656366 Feb 12 19:17:45.096000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:17:45.096000 audit: BPF prog-id=123 op=UNLOAD Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { perfmon } for pid=3043 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit[3043]: AVC avc: denied { bpf } for pid=3043 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.096000 audit: BPF prog-id=125 op=LOAD Feb 12 19:17:45.096000 audit[3043]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3031 pid=3043 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.096000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3234613032363432343431633161653232373266313732663666656366 Feb 12 19:17:45.337132 systemd[1]: Started cri-containerd-b8e86b1f43b1314aecd1ac6d6cc61352281851b7323f72cc338160762d99d24e.scope. Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.350000 audit: BPF prog-id=126 op=LOAD Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653836623166343362313331346165636431616336643663633631 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653836623166343362313331346165636431616336643663633631 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit: BPF prog-id=127 op=LOAD Feb 12 19:17:45.351000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653836623166343362313331346165636431616336643663633631 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit: BPF prog-id=128 op=LOAD Feb 12 19:17:45.351000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653836623166343362313331346165636431616336643663633631 Feb 12 19:17:45.351000 audit: BPF prog-id=128 op=UNLOAD Feb 12 19:17:45.351000 audit: BPF prog-id=127 op=UNLOAD Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { perfmon } for pid=3086 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit[3086]: AVC avc: denied { bpf } for pid=3086 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:45.351000 audit: BPF prog-id=129 op=LOAD Feb 12 19:17:45.351000 audit[3086]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3077 pid=3086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.351000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238653836623166343362313331346165636431616336643663633631 Feb 12 19:17:45.383725 env[1378]: time="2024-02-12T19:17:45.383679835Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-8k2w2,Uid:dfb679b1-bcec-4621-8b4b-119ceb97924c,Namespace:calico-system,Attempt:0,} returns sandbox id \"b8e86b1f43b1314aecd1ac6d6cc61352281851b7323f72cc338160762d99d24e\"" Feb 12 19:17:45.408000 audit[3137]: NETFILTER_CFG table=filter:110 family=2 entries=14 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:45.408000 audit[3137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4732 a0=3 a1=ffffcc198fb0 a2=0 a3=ffffae3fc6c0 items=0 ppid=2707 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:45.410000 audit[3137]: NETFILTER_CFG table=nat:111 family=2 entries=20 op=nft_register_rule pid=3137 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:45.410000 audit[3137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffcc198fb0 a2=0 a3=ffffae3fc6c0 items=0 ppid=2707 pid=3137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:45.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:46.199340 kubelet[2548]: E0212 19:17:46.199299 2548 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tgqqb" podUID=f43d848e-34cb-4479-97c9-1f49a005d06d Feb 12 19:17:46.475751 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3290633513.mount: Deactivated successfully. Feb 12 19:17:47.202371 env[1378]: time="2024-02-12T19:17:47.202335098Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:47.210815 env[1378]: time="2024-02-12T19:17:47.210773156Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:47.216389 env[1378]: time="2024-02-12T19:17:47.216346982Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:47.223112 env[1378]: time="2024-02-12T19:17:47.223076684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:47.223676 env[1378]: time="2024-02-12T19:17:47.223648042Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 12 19:17:47.226441 env[1378]: time="2024-02-12T19:17:47.225277878Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:17:47.236414 env[1378]: time="2024-02-12T19:17:47.236368529Z" level=info msg="CreateContainer within sandbox \"24a02642441c1ae2272f172f6fecffb8563bbbb73bbcc3b8ecb2d37c471961cf\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:17:47.267027 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount950603493.mount: Deactivated successfully. Feb 12 19:17:47.289044 env[1378]: time="2024-02-12T19:17:47.288991951Z" level=info msg="CreateContainer within sandbox \"24a02642441c1ae2272f172f6fecffb8563bbbb73bbcc3b8ecb2d37c471961cf\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"7f873cf486d6ab036dbfa7908f6b138be1c6a31fc038009822d9177d96374c5f\"" Feb 12 19:17:47.291326 env[1378]: time="2024-02-12T19:17:47.291296145Z" level=info msg="StartContainer for \"7f873cf486d6ab036dbfa7908f6b138be1c6a31fc038009822d9177d96374c5f\"" Feb 12 19:17:47.308656 systemd[1]: Started cri-containerd-7f873cf486d6ab036dbfa7908f6b138be1c6a31fc038009822d9177d96374c5f.scope. Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.325000 audit: BPF prog-id=130 op=LOAD Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3031 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:47.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383733636634383664366162303336646266613739303866366231 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3031 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:47.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383733636634383664366162303336646266613739303866366231 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit: BPF prog-id=131 op=LOAD Feb 12 19:17:47.326000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3031 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:47.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383733636634383664366162303336646266613739303866366231 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit: BPF prog-id=132 op=LOAD Feb 12 19:17:47.326000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3031 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:47.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383733636634383664366162303336646266613739303866366231 Feb 12 19:17:47.326000 audit: BPF prog-id=132 op=UNLOAD Feb 12 19:17:47.326000 audit: BPF prog-id=131 op=UNLOAD Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { perfmon } for pid=3149 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit[3149]: AVC avc: denied { bpf } for pid=3149 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:47.326000 audit: BPF prog-id=133 op=LOAD Feb 12 19:17:47.326000 audit[3149]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3031 pid=3149 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:47.326000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766383733636634383664366162303336646266613739303866366231 Feb 12 19:17:47.349118 env[1378]: time="2024-02-12T19:17:47.349064194Z" level=info msg="StartContainer for \"7f873cf486d6ab036dbfa7908f6b138be1c6a31fc038009822d9177d96374c5f\" returns successfully" Feb 12 19:17:48.199252 kubelet[2548]: E0212 19:17:48.199222 2548 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tgqqb" podUID=f43d848e-34cb-4479-97c9-1f49a005d06d Feb 12 19:17:48.356258 kubelet[2548]: E0212 19:17:48.356232 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.356477 kubelet[2548]: W0212 19:17:48.356439 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.356546 kubelet[2548]: E0212 19:17:48.356535 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.356782 kubelet[2548]: E0212 19:17:48.356771 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.356857 kubelet[2548]: W0212 19:17:48.356845 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.356923 kubelet[2548]: E0212 19:17:48.356915 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.357138 kubelet[2548]: E0212 19:17:48.357129 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.357202 kubelet[2548]: W0212 19:17:48.357191 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.357262 kubelet[2548]: E0212 19:17:48.357254 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.357505 kubelet[2548]: E0212 19:17:48.357494 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.357572 kubelet[2548]: W0212 19:17:48.357562 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.357640 kubelet[2548]: E0212 19:17:48.357631 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.357868 kubelet[2548]: E0212 19:17:48.357858 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.357938 kubelet[2548]: W0212 19:17:48.357928 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.357992 kubelet[2548]: E0212 19:17:48.357984 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.358206 kubelet[2548]: E0212 19:17:48.358197 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.358268 kubelet[2548]: W0212 19:17:48.358258 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.358340 kubelet[2548]: E0212 19:17:48.358329 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.358623 kubelet[2548]: E0212 19:17:48.358613 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.358705 kubelet[2548]: W0212 19:17:48.358693 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.358760 kubelet[2548]: E0212 19:17:48.358752 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.358968 kubelet[2548]: E0212 19:17:48.358959 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.359031 kubelet[2548]: W0212 19:17:48.359020 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.359091 kubelet[2548]: E0212 19:17:48.359083 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.359318 kubelet[2548]: E0212 19:17:48.359308 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.359381 kubelet[2548]: W0212 19:17:48.359371 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.359504 kubelet[2548]: E0212 19:17:48.359494 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.359710 kubelet[2548]: E0212 19:17:48.359700 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.359786 kubelet[2548]: W0212 19:17:48.359774 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.359846 kubelet[2548]: E0212 19:17:48.359837 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.360026 kubelet[2548]: E0212 19:17:48.360016 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.360088 kubelet[2548]: W0212 19:17:48.360078 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.360145 kubelet[2548]: E0212 19:17:48.360137 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.360330 kubelet[2548]: E0212 19:17:48.360320 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.360398 kubelet[2548]: W0212 19:17:48.360388 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.360499 kubelet[2548]: E0212 19:17:48.360489 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.368127 kubelet[2548]: E0212 19:17:48.368106 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.368127 kubelet[2548]: W0212 19:17:48.368122 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.368252 kubelet[2548]: E0212 19:17:48.368138 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.368418 kubelet[2548]: E0212 19:17:48.368386 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.368418 kubelet[2548]: W0212 19:17:48.368402 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.368488 kubelet[2548]: E0212 19:17:48.368430 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.368592 kubelet[2548]: E0212 19:17:48.368576 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.368592 kubelet[2548]: W0212 19:17:48.368588 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.368649 kubelet[2548]: E0212 19:17:48.368600 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.368749 kubelet[2548]: E0212 19:17:48.368736 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.368749 kubelet[2548]: W0212 19:17:48.368747 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.368823 kubelet[2548]: E0212 19:17:48.368760 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.368899 kubelet[2548]: E0212 19:17:48.368884 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.368899 kubelet[2548]: W0212 19:17:48.368896 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.368956 kubelet[2548]: E0212 19:17:48.368906 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.369028 kubelet[2548]: E0212 19:17:48.369013 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.369028 kubelet[2548]: W0212 19:17:48.369025 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.369086 kubelet[2548]: E0212 19:17:48.369039 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.369182 kubelet[2548]: E0212 19:17:48.369167 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.369182 kubelet[2548]: W0212 19:17:48.369178 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.369243 kubelet[2548]: E0212 19:17:48.369188 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.369442 kubelet[2548]: E0212 19:17:48.369429 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.369542 kubelet[2548]: W0212 19:17:48.369520 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.369622 kubelet[2548]: E0212 19:17:48.369612 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.369923 kubelet[2548]: E0212 19:17:48.369902 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.369923 kubelet[2548]: W0212 19:17:48.369920 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.370003 kubelet[2548]: E0212 19:17:48.369937 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.370100 kubelet[2548]: E0212 19:17:48.370077 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.370100 kubelet[2548]: W0212 19:17:48.370092 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.370152 kubelet[2548]: E0212 19:17:48.370103 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.370234 kubelet[2548]: E0212 19:17:48.370222 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.370234 kubelet[2548]: W0212 19:17:48.370233 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.370304 kubelet[2548]: E0212 19:17:48.370247 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.370428 kubelet[2548]: E0212 19:17:48.370391 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.370428 kubelet[2548]: W0212 19:17:48.370403 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.370428 kubelet[2548]: E0212 19:17:48.370427 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.370864 kubelet[2548]: E0212 19:17:48.370845 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.370916 kubelet[2548]: W0212 19:17:48.370865 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.370974 kubelet[2548]: E0212 19:17:48.370962 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.371036 kubelet[2548]: E0212 19:17:48.371005 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.371096 kubelet[2548]: W0212 19:17:48.371084 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.371199 kubelet[2548]: E0212 19:17:48.371180 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.371430 kubelet[2548]: E0212 19:17:48.371390 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.371525 kubelet[2548]: W0212 19:17:48.371509 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.371587 kubelet[2548]: E0212 19:17:48.371577 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.371816 kubelet[2548]: E0212 19:17:48.371801 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.371899 kubelet[2548]: W0212 19:17:48.371886 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.371956 kubelet[2548]: E0212 19:17:48.371948 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.372171 kubelet[2548]: E0212 19:17:48.372160 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.372240 kubelet[2548]: W0212 19:17:48.372228 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.372298 kubelet[2548]: E0212 19:17:48.372289 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.372670 kubelet[2548]: E0212 19:17:48.372657 2548 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:48.372768 kubelet[2548]: W0212 19:17:48.372756 2548 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:48.372830 kubelet[2548]: E0212 19:17:48.372821 2548 plugins.go:736] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:48.600419 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3936455267.mount: Deactivated successfully. Feb 12 19:17:48.784493 env[1378]: time="2024-02-12T19:17:48.784450100Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:48.795727 env[1378]: time="2024-02-12T19:17:48.795665191Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:48.800271 env[1378]: time="2024-02-12T19:17:48.800227499Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:48.804928 env[1378]: time="2024-02-12T19:17:48.804888487Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:48.805504 env[1378]: time="2024-02-12T19:17:48.805470246Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:17:48.807574 env[1378]: time="2024-02-12T19:17:48.807537960Z" level=info msg="CreateContainer within sandbox \"b8e86b1f43b1314aecd1ac6d6cc61352281851b7323f72cc338160762d99d24e\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:17:48.854662 env[1378]: time="2024-02-12T19:17:48.854559879Z" level=info msg="CreateContainer within sandbox \"b8e86b1f43b1314aecd1ac6d6cc61352281851b7323f72cc338160762d99d24e\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"f31a82593e17c4201386aefb00e7e13558e6ad2cbb15900fed801035f0424d1e\"" Feb 12 19:17:48.855492 env[1378]: time="2024-02-12T19:17:48.855441397Z" level=info msg="StartContainer for \"f31a82593e17c4201386aefb00e7e13558e6ad2cbb15900fed801035f0424d1e\"" Feb 12 19:17:48.871574 systemd[1]: Started cri-containerd-f31a82593e17c4201386aefb00e7e13558e6ad2cbb15900fed801035f0424d1e.scope. Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3077 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:48.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633316138323539336531376334323031333836616566623030653765 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.886000 audit: BPF prog-id=134 op=LOAD Feb 12 19:17:48.886000 audit[3217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3077 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:48.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633316138323539336531376334323031333836616566623030653765 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit: BPF prog-id=135 op=LOAD Feb 12 19:17:48.887000 audit[3217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3077 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:48.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633316138323539336531376334323031333836616566623030653765 Feb 12 19:17:48.887000 audit: BPF prog-id=135 op=UNLOAD Feb 12 19:17:48.887000 audit: BPF prog-id=134 op=UNLOAD Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { perfmon } for pid=3217 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit[3217]: AVC avc: denied { bpf } for pid=3217 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.887000 audit: BPF prog-id=136 op=LOAD Feb 12 19:17:48.887000 audit[3217]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3077 pid=3217 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:48.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6633316138323539336531376334323031333836616566623030653765 Feb 12 19:17:48.906823 env[1378]: time="2024-02-12T19:17:48.906771744Z" level=info msg="StartContainer for \"f31a82593e17c4201386aefb00e7e13558e6ad2cbb15900fed801035f0424d1e\" returns successfully" Feb 12 19:17:48.914609 systemd[1]: cri-containerd-f31a82593e17c4201386aefb00e7e13558e6ad2cbb15900fed801035f0424d1e.scope: Deactivated successfully. Feb 12 19:17:48.917000 audit: BPF prog-id=136 op=UNLOAD Feb 12 19:17:49.275889 kubelet[2548]: I0212 19:17:49.275837 2548 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:17:49.301571 kubelet[2548]: I0212 19:17:49.301531 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7468cccd88-rb89v" podStartSLOduration=-9.223372031553282e+09 pod.CreationTimestamp="2024-02-12 19:17:44 +0000 UTC" firstStartedPulling="2024-02-12 19:17:45.243703253 +0000 UTC m=+24.293797274" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:48.285563869 +0000 UTC m=+27.335657930" watchObservedRunningTime="2024-02-12 19:17:49.301493135 +0000 UTC m=+28.351587116" Feb 12 19:17:49.785054 env[1378]: time="2024-02-12T19:17:49.785008864Z" level=info msg="shim disconnected" id=f31a82593e17c4201386aefb00e7e13558e6ad2cbb15900fed801035f0424d1e Feb 12 19:17:49.785475 env[1378]: time="2024-02-12T19:17:49.785455023Z" level=warning msg="cleaning up after shim disconnected" id=f31a82593e17c4201386aefb00e7e13558e6ad2cbb15900fed801035f0424d1e namespace=k8s.io Feb 12 19:17:49.785554 env[1378]: time="2024-02-12T19:17:49.785541662Z" level=info msg="cleaning up dead shim" Feb 12 19:17:49.792865 env[1378]: time="2024-02-12T19:17:49.792820724Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:17:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3261 runtime=io.containerd.runc.v2\n" Feb 12 19:17:50.199492 kubelet[2548]: E0212 19:17:50.199462 2548 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tgqqb" podUID=f43d848e-34cb-4479-97c9-1f49a005d06d Feb 12 19:17:50.279371 env[1378]: time="2024-02-12T19:17:50.279325215Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:17:51.646873 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2304898414.mount: Deactivated successfully. Feb 12 19:17:52.200144 kubelet[2548]: E0212 19:17:52.200112 2548 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tgqqb" podUID=f43d848e-34cb-4479-97c9-1f49a005d06d Feb 12 19:17:53.771985 env[1378]: time="2024-02-12T19:17:53.771934264Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:53.777526 env[1378]: time="2024-02-12T19:17:53.777489091Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:53.780848 env[1378]: time="2024-02-12T19:17:53.780809963Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:53.784038 env[1378]: time="2024-02-12T19:17:53.784002395Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:53.784629 env[1378]: time="2024-02-12T19:17:53.784576394Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:17:53.788865 env[1378]: time="2024-02-12T19:17:53.788837143Z" level=info msg="CreateContainer within sandbox \"b8e86b1f43b1314aecd1ac6d6cc61352281851b7323f72cc338160762d99d24e\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:17:53.813472 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount816542298.mount: Deactivated successfully. Feb 12 19:17:53.827905 env[1378]: time="2024-02-12T19:17:53.827862529Z" level=info msg="CreateContainer within sandbox \"b8e86b1f43b1314aecd1ac6d6cc61352281851b7323f72cc338160762d99d24e\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"277e47f8cad8d098e124114d8d3bace3278cedf2c6450572fdebf7dc3cb4a61c\"" Feb 12 19:17:53.829446 env[1378]: time="2024-02-12T19:17:53.828643967Z" level=info msg="StartContainer for \"277e47f8cad8d098e124114d8d3bace3278cedf2c6450572fdebf7dc3cb4a61c\"" Feb 12 19:17:53.851439 systemd[1]: Started cri-containerd-277e47f8cad8d098e124114d8d3bace3278cedf2c6450572fdebf7dc3cb4a61c.scope. Feb 12 19:17:53.901231 kernel: kauditd_printk_skb: 211 callbacks suppressed Feb 12 19:17:53.901581 kernel: audit: type=1400 audit(1707765473.874:1145): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.901660 kernel: audit: type=1300 audit(1707765473.874:1145): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3077 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit[3282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3077 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:53.929796 kernel: audit: type=1327 audit(1707765473.874:1145): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237376534376638636164386430393865313234313134643864336261 Feb 12 19:17:53.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237376534376638636164386430393865313234313134643864336261 Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.978078 kernel: audit: type=1400 audit(1707765473.874:1146): avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.998037 kernel: audit: type=1400 audit(1707765473.874:1146): avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.018465 kernel: audit: type=1400 audit(1707765473.874:1146): avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.018606 kernel: audit: type=1400 audit(1707765473.874:1146): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.023358 env[1378]: time="2024-02-12T19:17:54.023261579Z" level=info msg="StartContainer for \"277e47f8cad8d098e124114d8d3bace3278cedf2c6450572fdebf7dc3cb4a61c\" returns successfully" Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.057018 kernel: audit: type=1400 audit(1707765473.874:1146): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.057164 kernel: audit: type=1400 audit(1707765473.874:1146): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.099199 kernel: audit: type=1400 audit(1707765473.874:1146): avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.874000 audit: BPF prog-id=137 op=LOAD Feb 12 19:17:53.874000 audit[3282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3077 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:53.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237376534376638636164386430393865313234313134643864336261 Feb 12 19:17:53.880000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.880000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.880000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.880000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.880000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.880000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.880000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.880000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.880000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.880000 audit: BPF prog-id=138 op=LOAD Feb 12 19:17:53.880000 audit[3282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3077 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:53.880000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237376534376638636164386430393865313234313134643864336261 Feb 12 19:17:53.902000 audit: BPF prog-id=138 op=UNLOAD Feb 12 19:17:53.902000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { perfmon } for pid=3282 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit[3282]: AVC avc: denied { bpf } for pid=3282 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:53.902000 audit: BPF prog-id=139 op=LOAD Feb 12 19:17:53.902000 audit[3282]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3077 pid=3282 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:53.902000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237376534376638636164386430393865313234313134643864336261 Feb 12 19:17:54.200217 kubelet[2548]: E0212 19:17:54.199898 2548 pod_workers.go:965] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-tgqqb" podUID=f43d848e-34cb-4479-97c9-1f49a005d06d Feb 12 19:17:54.811454 systemd[1]: run-containerd-runc-k8s.io-277e47f8cad8d098e124114d8d3bace3278cedf2c6450572fdebf7dc3cb4a61c-runc.PM9EhT.mount: Deactivated successfully. Feb 12 19:17:55.737637 systemd[1]: cri-containerd-277e47f8cad8d098e124114d8d3bace3278cedf2c6450572fdebf7dc3cb4a61c.scope: Deactivated successfully. Feb 12 19:17:55.740000 audit: BPF prog-id=139 op=UNLOAD Feb 12 19:17:55.754469 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-277e47f8cad8d098e124114d8d3bace3278cedf2c6450572fdebf7dc3cb4a61c-rootfs.mount: Deactivated successfully. Feb 12 19:17:55.820867 kubelet[2548]: I0212 19:17:55.819232 2548 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:17:55.872860 kubelet[2548]: I0212 19:17:55.841176 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:55.872860 kubelet[2548]: I0212 19:17:55.844484 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:55.872860 kubelet[2548]: I0212 19:17:55.856680 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:17:55.847496 systemd[1]: Created slice kubepods-burstable-pod167d5c07_6115_4111_9a6f_d5cbc28dedbc.slice. Feb 12 19:17:55.853824 systemd[1]: Created slice kubepods-burstable-pod9f3b6520_f0dd_4025_8b27_732678b24b50.slice. Feb 12 19:17:55.860934 systemd[1]: Created slice kubepods-besteffort-pod2602b6b4_46c5_4c52_ad27_5e5ac9d0fb73.slice. Feb 12 19:17:56.013594 kubelet[2548]: I0212 19:17:56.013493 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p4pkp\" (UniqueName: \"kubernetes.io/projected/167d5c07-6115-4111-9a6f-d5cbc28dedbc-kube-api-access-p4pkp\") pod \"coredns-787d4945fb-8lgvg\" (UID: \"167d5c07-6115-4111-9a6f-d5cbc28dedbc\") " pod="kube-system/coredns-787d4945fb-8lgvg" Feb 12 19:17:56.013798 kubelet[2548]: I0212 19:17:56.013785 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9f3b6520-f0dd-4025-8b27-732678b24b50-config-volume\") pod \"coredns-787d4945fb-bqggh\" (UID: \"9f3b6520-f0dd-4025-8b27-732678b24b50\") " pod="kube-system/coredns-787d4945fb-bqggh" Feb 12 19:17:56.013884 kubelet[2548]: I0212 19:17:56.013875 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/167d5c07-6115-4111-9a6f-d5cbc28dedbc-config-volume\") pod \"coredns-787d4945fb-8lgvg\" (UID: \"167d5c07-6115-4111-9a6f-d5cbc28dedbc\") " pod="kube-system/coredns-787d4945fb-8lgvg" Feb 12 19:17:56.013969 kubelet[2548]: I0212 19:17:56.013958 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73-tigera-ca-bundle\") pod \"calico-kube-controllers-77b7ff686c-vh2cp\" (UID: \"2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73\") " pod="calico-system/calico-kube-controllers-77b7ff686c-vh2cp" Feb 12 19:17:56.014047 kubelet[2548]: I0212 19:17:56.014038 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hmnkq\" (UniqueName: \"kubernetes.io/projected/9f3b6520-f0dd-4025-8b27-732678b24b50-kube-api-access-hmnkq\") pod \"coredns-787d4945fb-bqggh\" (UID: \"9f3b6520-f0dd-4025-8b27-732678b24b50\") " pod="kube-system/coredns-787d4945fb-bqggh" Feb 12 19:17:56.014137 kubelet[2548]: I0212 19:17:56.014127 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-c2qzv\" (UniqueName: \"kubernetes.io/projected/2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73-kube-api-access-c2qzv\") pod \"calico-kube-controllers-77b7ff686c-vh2cp\" (UID: \"2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73\") " pod="calico-system/calico-kube-controllers-77b7ff686c-vh2cp" Feb 12 19:17:56.175280 env[1378]: time="2024-02-12T19:17:56.174937101Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-8lgvg,Uid:167d5c07-6115-4111-9a6f-d5cbc28dedbc,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:56.175280 env[1378]: time="2024-02-12T19:17:56.174931981Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77b7ff686c-vh2cp,Uid:2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73,Namespace:calico-system,Attempt:0,}" Feb 12 19:17:56.182541 env[1378]: time="2024-02-12T19:17:56.182501763Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-bqggh,Uid:9f3b6520-f0dd-4025-8b27-732678b24b50,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:56.204127 systemd[1]: Created slice kubepods-besteffort-podf43d848e_34cb_4479_97c9_1f49a005d06d.slice. Feb 12 19:17:56.206501 env[1378]: time="2024-02-12T19:17:56.206392868Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tgqqb,Uid:f43d848e-34cb-4479-97c9-1f49a005d06d,Namespace:calico-system,Attempt:0,}" Feb 12 19:17:56.481980 env[1378]: time="2024-02-12T19:17:56.481925909Z" level=info msg="shim disconnected" id=277e47f8cad8d098e124114d8d3bace3278cedf2c6450572fdebf7dc3cb4a61c Feb 12 19:17:56.481980 env[1378]: time="2024-02-12T19:17:56.481969389Z" level=warning msg="cleaning up after shim disconnected" id=277e47f8cad8d098e124114d8d3bace3278cedf2c6450572fdebf7dc3cb4a61c namespace=k8s.io Feb 12 19:17:56.481980 env[1378]: time="2024-02-12T19:17:56.481978428Z" level=info msg="cleaning up dead shim" Feb 12 19:17:56.488520 env[1378]: time="2024-02-12T19:17:56.488474653Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:17:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3334 runtime=io.containerd.runc.v2\n" Feb 12 19:17:56.657612 env[1378]: time="2024-02-12T19:17:56.657545781Z" level=error msg="Failed to destroy network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.658489 env[1378]: time="2024-02-12T19:17:56.658451739Z" level=error msg="encountered an error cleaning up failed sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.658635 env[1378]: time="2024-02-12T19:17:56.658609619Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-8lgvg,Uid:167d5c07-6115-4111-9a6f-d5cbc28dedbc,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.659129 kubelet[2548]: E0212 19:17:56.658876 2548 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.659129 kubelet[2548]: E0212 19:17:56.658943 2548 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-8lgvg" Feb 12 19:17:56.659129 kubelet[2548]: E0212 19:17:56.658962 2548 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-8lgvg" Feb 12 19:17:56.659267 kubelet[2548]: E0212 19:17:56.659006 2548 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-8lgvg_kube-system(167d5c07-6115-4111-9a6f-d5cbc28dedbc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-8lgvg_kube-system(167d5c07-6115-4111-9a6f-d5cbc28dedbc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-8lgvg" podUID=167d5c07-6115-4111-9a6f-d5cbc28dedbc Feb 12 19:17:56.663049 env[1378]: time="2024-02-12T19:17:56.663007529Z" level=error msg="Failed to destroy network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.663355 env[1378]: time="2024-02-12T19:17:56.663324528Z" level=error msg="encountered an error cleaning up failed sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.663398 env[1378]: time="2024-02-12T19:17:56.663378168Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-bqggh,Uid:9f3b6520-f0dd-4025-8b27-732678b24b50,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.664632 kubelet[2548]: E0212 19:17:56.663572 2548 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.664632 kubelet[2548]: E0212 19:17:56.663613 2548 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-bqggh" Feb 12 19:17:56.664632 kubelet[2548]: E0212 19:17:56.663632 2548 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-787d4945fb-bqggh" Feb 12 19:17:56.664777 kubelet[2548]: E0212 19:17:56.663672 2548 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-787d4945fb-bqggh_kube-system(9f3b6520-f0dd-4025-8b27-732678b24b50)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-787d4945fb-bqggh_kube-system(9f3b6520-f0dd-4025-8b27-732678b24b50)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-bqggh" podUID=9f3b6520-f0dd-4025-8b27-732678b24b50 Feb 12 19:17:56.683643 env[1378]: time="2024-02-12T19:17:56.683587921Z" level=error msg="Failed to destroy network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.684071 env[1378]: time="2024-02-12T19:17:56.684041280Z" level=error msg="encountered an error cleaning up failed sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.684183 env[1378]: time="2024-02-12T19:17:56.684159480Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77b7ff686c-vh2cp,Uid:2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.684536 kubelet[2548]: E0212 19:17:56.684465 2548 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.684749 kubelet[2548]: E0212 19:17:56.684626 2548 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-77b7ff686c-vh2cp" Feb 12 19:17:56.684749 kubelet[2548]: E0212 19:17:56.684656 2548 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-77b7ff686c-vh2cp" Feb 12 19:17:56.684749 kubelet[2548]: E0212 19:17:56.684709 2548 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-77b7ff686c-vh2cp_calico-system(2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-77b7ff686c-vh2cp_calico-system(2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-77b7ff686c-vh2cp" podUID=2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73 Feb 12 19:17:56.699085 env[1378]: time="2024-02-12T19:17:56.699015085Z" level=error msg="Failed to destroy network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.699424 env[1378]: time="2024-02-12T19:17:56.699370164Z" level=error msg="encountered an error cleaning up failed sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.699466 env[1378]: time="2024-02-12T19:17:56.699446284Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tgqqb,Uid:f43d848e-34cb-4479-97c9-1f49a005d06d,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.699813 kubelet[2548]: E0212 19:17:56.699668 2548 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.699813 kubelet[2548]: E0212 19:17:56.699714 2548 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tgqqb" Feb 12 19:17:56.699813 kubelet[2548]: E0212 19:17:56.699736 2548 kuberuntime_manager.go:782] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-tgqqb" Feb 12 19:17:56.699956 kubelet[2548]: E0212 19:17:56.699788 2548 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-tgqqb_calico-system(f43d848e-34cb-4479-97c9-1f49a005d06d)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-tgqqb_calico-system(f43d848e-34cb-4479-97c9-1f49a005d06d)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tgqqb" podUID=f43d848e-34cb-4479-97c9-1f49a005d06d Feb 12 19:17:57.128402 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc-shm.mount: Deactivated successfully. Feb 12 19:17:57.291188 kubelet[2548]: I0212 19:17:57.291156 2548 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:17:57.292103 env[1378]: time="2024-02-12T19:17:57.292069638Z" level=info msg="StopPodSandbox for \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\"" Feb 12 19:17:57.295147 kubelet[2548]: I0212 19:17:57.295120 2548 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:17:57.297515 env[1378]: time="2024-02-12T19:17:57.297460426Z" level=info msg="StopPodSandbox for \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\"" Feb 12 19:17:57.302510 env[1378]: time="2024-02-12T19:17:57.302462894Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:17:57.304534 kubelet[2548]: I0212 19:17:57.303766 2548 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:17:57.305571 env[1378]: time="2024-02-12T19:17:57.305541327Z" level=info msg="StopPodSandbox for \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\"" Feb 12 19:17:57.311108 kubelet[2548]: I0212 19:17:57.311082 2548 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:17:57.312446 env[1378]: time="2024-02-12T19:17:57.312393431Z" level=info msg="StopPodSandbox for \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\"" Feb 12 19:17:57.344399 env[1378]: time="2024-02-12T19:17:57.344330158Z" level=error msg="StopPodSandbox for \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\" failed" error="failed to destroy network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.344876 kubelet[2548]: E0212 19:17:57.344836 2548 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:17:57.344961 kubelet[2548]: E0212 19:17:57.344903 2548 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66} Feb 12 19:17:57.344961 kubelet[2548]: E0212 19:17:57.344935 2548 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"f43d848e-34cb-4479-97c9-1f49a005d06d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:17:57.344961 kubelet[2548]: E0212 19:17:57.344962 2548 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"f43d848e-34cb-4479-97c9-1f49a005d06d\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-tgqqb" podUID=f43d848e-34cb-4479-97c9-1f49a005d06d Feb 12 19:17:57.381539 env[1378]: time="2024-02-12T19:17:57.381428833Z" level=error msg="StopPodSandbox for \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\" failed" error="failed to destroy network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.382185 kubelet[2548]: E0212 19:17:57.382157 2548 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:17:57.382288 kubelet[2548]: E0212 19:17:57.382200 2548 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748} Feb 12 19:17:57.382288 kubelet[2548]: E0212 19:17:57.382235 2548 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:17:57.382288 kubelet[2548]: E0212 19:17:57.382262 2548 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-77b7ff686c-vh2cp" podUID=2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73 Feb 12 19:17:57.384563 env[1378]: time="2024-02-12T19:17:57.384513786Z" level=error msg="StopPodSandbox for \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\" failed" error="failed to destroy network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.384706 kubelet[2548]: E0212 19:17:57.384689 2548 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:17:57.384771 kubelet[2548]: E0212 19:17:57.384713 2548 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc} Feb 12 19:17:57.384771 kubelet[2548]: E0212 19:17:57.384742 2548 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9f3b6520-f0dd-4025-8b27-732678b24b50\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:17:57.384875 kubelet[2548]: E0212 19:17:57.384772 2548 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9f3b6520-f0dd-4025-8b27-732678b24b50\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-bqggh" podUID=9f3b6520-f0dd-4025-8b27-732678b24b50 Feb 12 19:17:57.388873 env[1378]: time="2024-02-12T19:17:57.388834136Z" level=error msg="StopPodSandbox for \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\" failed" error="failed to destroy network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.389129 kubelet[2548]: E0212 19:17:57.389103 2548 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:17:57.389186 kubelet[2548]: E0212 19:17:57.389131 2548 kuberuntime_manager.go:965] "Failed to stop sandbox" podSandboxID={Type:containerd ID:9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09} Feb 12 19:17:57.389186 kubelet[2548]: E0212 19:17:57.389163 2548 kuberuntime_manager.go:705] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"167d5c07-6115-4111-9a6f-d5cbc28dedbc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:17:57.389186 kubelet[2548]: E0212 19:17:57.389186 2548 pod_workers.go:965] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"167d5c07-6115-4111-9a6f-d5cbc28dedbc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-787d4945fb-8lgvg" podUID=167d5c07-6115-4111-9a6f-d5cbc28dedbc Feb 12 19:17:58.292941 kubelet[2548]: I0212 19:17:58.292906 2548 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:17:58.340000 audit[3576]: NETFILTER_CFG table=filter:112 family=2 entries=13 op=nft_register_rule pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:58.340000 audit[3576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffda0937d0 a2=0 a3=ffff9c4a26c0 items=0 ppid=2707 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:58.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:58.341000 audit[3576]: NETFILTER_CFG table=nat:113 family=2 entries=27 op=nft_register_chain pid=3576 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:58.341000 audit[3576]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffda0937d0 a2=0 a3=ffff9c4a26c0 items=0 ppid=2707 pid=3576 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:58.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:03.454096 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4145637414.mount: Deactivated successfully. Feb 12 19:18:03.760113 env[1378]: time="2024-02-12T19:18:03.759978937Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:03.766436 env[1378]: time="2024-02-12T19:18:03.766361564Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:03.770310 env[1378]: time="2024-02-12T19:18:03.770279515Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:03.774138 env[1378]: time="2024-02-12T19:18:03.774110787Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:03.774582 env[1378]: time="2024-02-12T19:18:03.774555226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:18:03.789095 env[1378]: time="2024-02-12T19:18:03.789055915Z" level=info msg="CreateContainer within sandbox \"b8e86b1f43b1314aecd1ac6d6cc61352281851b7323f72cc338160762d99d24e\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:18:03.814887 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1514709482.mount: Deactivated successfully. Feb 12 19:18:03.830749 env[1378]: time="2024-02-12T19:18:03.830694706Z" level=info msg="CreateContainer within sandbox \"b8e86b1f43b1314aecd1ac6d6cc61352281851b7323f72cc338160762d99d24e\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"bac2b16736a67b2f41f6cf75bbe4d54dc09bb24841f96a18a5d18102dcdf3013\"" Feb 12 19:18:03.831761 env[1378]: time="2024-02-12T19:18:03.831719544Z" level=info msg="StartContainer for \"bac2b16736a67b2f41f6cf75bbe4d54dc09bb24841f96a18a5d18102dcdf3013\"" Feb 12 19:18:03.847561 systemd[1]: Started cri-containerd-bac2b16736a67b2f41f6cf75bbe4d54dc09bb24841f96a18a5d18102dcdf3013.scope. Feb 12 19:18:03.901957 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 12 19:18:03.902097 kernel: audit: type=1400 audit(1707765483.870:1154): avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3077 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633262313637333661363762326634316636636637356262653464 Feb 12 19:18:03.934429 kernel: audit: type=1300 audit(1707765483.870:1154): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3077 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.964478 kernel: audit: type=1327 audit(1707765483.870:1154): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633262313637333661363762326634316636636637356262653464 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.006997 kernel: audit: type=1400 audit(1707765483.870:1155): avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.008694 kernel: audit: type=1400 audit(1707765483.870:1155): avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.008731 kernel: audit: type=1400 audit(1707765483.870:1155): avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.014104 env[1378]: time="2024-02-12T19:18:04.013899635Z" level=info msg="StartContainer for \"bac2b16736a67b2f41f6cf75bbe4d54dc09bb24841f96a18a5d18102dcdf3013\" returns successfully" Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.052774 kernel: audit: type=1400 audit(1707765483.870:1155): avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.076919 kernel: audit: type=1400 audit(1707765483.870:1155): avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.077057 kernel: audit: type=1400 audit(1707765483.870:1155): avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.119205 kernel: audit: type=1400 audit(1707765483.870:1155): avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.870000 audit: BPF prog-id=140 op=LOAD Feb 12 19:18:03.870000 audit[3589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3077 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633262313637333661363762326634316636636637356262653464 Feb 12 19:18:03.877000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.877000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.877000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.877000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.877000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.877000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.877000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.877000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.877000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.877000 audit: BPF prog-id=141 op=LOAD Feb 12 19:18:03.877000 audit[3589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3077 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.877000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633262313637333661363762326634316636636637356262653464 Feb 12 19:18:03.901000 audit: BPF prog-id=141 op=UNLOAD Feb 12 19:18:03.901000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { perfmon } for pid=3589 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit[3589]: AVC avc: denied { bpf } for pid=3589 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.901000 audit: BPF prog-id=142 op=LOAD Feb 12 19:18:03.901000 audit[3589]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3077 pid=3589 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.901000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261633262313637333661363762326634316636636637356262653464 Feb 12 19:18:04.350087 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:18:04.350235 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:18:04.351836 kubelet[2548]: I0212 19:18:04.351799 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-8k2w2" podStartSLOduration=-9.223372016503016e+09 pod.CreationTimestamp="2024-02-12 19:17:44 +0000 UTC" firstStartedPulling="2024-02-12 19:17:45.386302148 +0000 UTC m=+24.436396129" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:18:04.351349322 +0000 UTC m=+43.401443343" watchObservedRunningTime="2024-02-12 19:18:04.351760761 +0000 UTC m=+43.401854782" Feb 12 19:18:05.758000 audit[3681]: AVC avc: denied { write } for pid=3681 comm="tee" name="fd" dev="proc" ino=25423 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.758000 audit[3681]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffd64d4961 a2=241 a3=1b6 items=1 ppid=3656 pid=3681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.758000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:18:05.758000 audit: PATH item=0 name="/dev/fd/63" inode=25418 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.758000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.763000 audit[3685]: AVC avc: denied { write } for pid=3685 comm="tee" name="fd" dev="proc" ino=25432 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.763000 audit[3685]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb79b972 a2=241 a3=1b6 items=1 ppid=3662 pid=3685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.763000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:18:05.763000 audit: PATH item=0 name="/dev/fd/63" inode=24528 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.763000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.765000 audit[3687]: AVC avc: denied { write } for pid=3687 comm="tee" name="fd" dev="proc" ino=25436 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.765000 audit[3687]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff1d6c971 a2=241 a3=1b6 items=1 ppid=3660 pid=3687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.765000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:18:05.765000 audit: PATH item=0 name="/dev/fd/63" inode=25427 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.765000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.767000 audit[3690]: AVC avc: denied { write } for pid=3690 comm="tee" name="fd" dev="proc" ino=25440 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.767000 audit[3690]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe939d971 a2=241 a3=1b6 items=1 ppid=3661 pid=3690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.767000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:18:05.767000 audit: PATH item=0 name="/dev/fd/63" inode=24531 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.767000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.769000 audit[3695]: AVC avc: denied { write } for pid=3695 comm="tee" name="fd" dev="proc" ino=25446 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.769000 audit[3695]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffed5aa962 a2=241 a3=1b6 items=1 ppid=3664 pid=3695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.769000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:18:05.769000 audit: PATH item=0 name="/dev/fd/63" inode=24536 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.769000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.776000 audit[3697]: AVC avc: denied { write } for pid=3697 comm="tee" name="fd" dev="proc" ino=25450 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.776000 audit[3697]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffdb96971 a2=241 a3=1b6 items=1 ppid=3663 pid=3697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.776000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:18:05.776000 audit: PATH item=0 name="/dev/fd/63" inode=24537 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.776000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.791000 audit[3704]: AVC avc: denied { write } for pid=3704 comm="tee" name="fd" dev="proc" ino=25472 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.791000 audit[3704]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc5da2973 a2=241 a3=1b6 items=1 ppid=3659 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.791000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:18:05.791000 audit: PATH item=0 name="/dev/fd/63" inode=24538 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.791000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:06.144000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.144000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.144000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.144000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.144000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.144000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.144000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.144000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.144000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.144000 audit: BPF prog-id=143 op=LOAD Feb 12 19:18:06.144000 audit[3795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf777368 a2=70 a3=0 items=0 ppid=3709 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.144000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:18:06.147000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:18:06.147000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.147000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.147000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.147000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.147000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.147000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.147000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.147000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.147000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.147000 audit: BPF prog-id=144 op=LOAD Feb 12 19:18:06.147000 audit[3795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffdf777368 a2=70 a3=4a174c items=0 ppid=3709 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.147000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:18:06.149000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:18:06.149000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.149000 audit[3795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffdf777398 a2=70 a3=18bbb79f items=0 ppid=3709 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.149000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { perfmon } for pid=3795 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit[3795]: AVC avc: denied { bpf } for pid=3795 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.153000 audit: BPF prog-id=145 op=LOAD Feb 12 19:18:06.153000 audit[3795]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffdf7772e8 a2=70 a3=18bbb7b9 items=0 ppid=3709 pid=3795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.153000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:18:06.157000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.157000 audit[3797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffea3bef28 a2=70 a3=0 items=0 ppid=3709 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.157000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:18:06.158000 audit[3797]: AVC avc: denied { bpf } for pid=3797 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.158000 audit[3797]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffea3bee08 a2=70 a3=2 items=0 ppid=3709 pid=3797 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.158000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:18:06.166000 audit: BPF prog-id=145 op=UNLOAD Feb 12 19:18:06.317000 audit[3824]: NETFILTER_CFG table=mangle:114 family=2 entries=19 op=nft_register_chain pid=3824 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:06.317000 audit[3824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffe3825f80 a2=0 a3=ffffb107afa8 items=0 ppid=3709 pid=3824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.317000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:06.332000 audit[3825]: NETFILTER_CFG table=nat:115 family=2 entries=16 op=nft_register_chain pid=3825 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:06.332000 audit[3825]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffdb37ee90 a2=0 a3=ffff9d07efa8 items=0 ppid=3709 pid=3825 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.332000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:06.333000 audit[3823]: NETFILTER_CFG table=raw:116 family=2 entries=19 op=nft_register_chain pid=3823 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:06.333000 audit[3823]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffefbc89f0 a2=0 a3=ffffa87b6fa8 items=0 ppid=3709 pid=3823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.333000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:06.335000 audit[3829]: NETFILTER_CFG table=filter:117 family=2 entries=39 op=nft_register_chain pid=3829 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:06.335000 audit[3829]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=fffff40184f0 a2=0 a3=ffff98fc9fa8 items=0 ppid=3709 pid=3829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.335000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:07.050205 systemd-networkd[1532]: vxlan.calico: Link UP Feb 12 19:18:07.050212 systemd-networkd[1532]: vxlan.calico: Gained carrier Feb 12 19:18:08.443558 systemd-networkd[1532]: vxlan.calico: Gained IPv6LL Feb 12 19:18:09.201134 env[1378]: time="2024-02-12T19:18:09.201079905Z" level=info msg="StopPodSandbox for \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\"" Feb 12 19:18:09.202826 env[1378]: time="2024-02-12T19:18:09.202787581Z" level=info msg="StopPodSandbox for \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\"" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.280 [INFO][3869] k8s.go 578: Cleaning up netns ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.280 [INFO][3869] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" iface="eth0" netns="/var/run/netns/cni-40c07ca2-4c59-19be-a361-2118a36dedd2" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.281 [INFO][3869] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" iface="eth0" netns="/var/run/netns/cni-40c07ca2-4c59-19be-a361-2118a36dedd2" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.281 [INFO][3869] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" iface="eth0" netns="/var/run/netns/cni-40c07ca2-4c59-19be-a361-2118a36dedd2" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.281 [INFO][3869] k8s.go 585: Releasing IP address(es) ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.281 [INFO][3869] utils.go 188: Calico CNI releasing IP address ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.310 [INFO][3881] ipam_plugin.go 415: Releasing address using handleID ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" HandleID="k8s-pod-network.63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.310 [INFO][3881] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.310 [INFO][3881] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.320 [WARNING][3881] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" HandleID="k8s-pod-network.63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.320 [INFO][3881] ipam_plugin.go 443: Releasing address using workloadID ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" HandleID="k8s-pod-network.63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.321 [INFO][3881] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:09.324526 env[1378]: 2024-02-12 19:18:09.322 [INFO][3869] k8s.go 591: Teardown processing complete. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:09.326998 systemd[1]: run-netns-cni\x2d40c07ca2\x2d4c59\x2d19be\x2da361\x2d2118a36dedd2.mount: Deactivated successfully. Feb 12 19:18:09.327953 env[1378]: time="2024-02-12T19:18:09.327914650Z" level=info msg="TearDown network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\" successfully" Feb 12 19:18:09.328059 env[1378]: time="2024-02-12T19:18:09.328042210Z" level=info msg="StopPodSandbox for \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\" returns successfully" Feb 12 19:18:09.331873 env[1378]: time="2024-02-12T19:18:09.331836882Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tgqqb,Uid:f43d848e-34cb-4479-97c9-1f49a005d06d,Namespace:calico-system,Attempt:1,}" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.285 [INFO][3868] k8s.go 578: Cleaning up netns ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.285 [INFO][3868] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" iface="eth0" netns="/var/run/netns/cni-63636ead-e252-1149-5ed5-75793af7108b" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.285 [INFO][3868] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" iface="eth0" netns="/var/run/netns/cni-63636ead-e252-1149-5ed5-75793af7108b" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.285 [INFO][3868] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" iface="eth0" netns="/var/run/netns/cni-63636ead-e252-1149-5ed5-75793af7108b" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.285 [INFO][3868] k8s.go 585: Releasing IP address(es) ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.285 [INFO][3868] utils.go 188: Calico CNI releasing IP address ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.315 [INFO][3882] ipam_plugin.go 415: Releasing address using handleID ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" HandleID="k8s-pod-network.9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.315 [INFO][3882] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.322 [INFO][3882] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.335 [WARNING][3882] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" HandleID="k8s-pod-network.9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.335 [INFO][3882] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" HandleID="k8s-pod-network.9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.337 [INFO][3882] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:09.340880 env[1378]: 2024-02-12 19:18:09.339 [INFO][3868] k8s.go 591: Teardown processing complete. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:09.344488 env[1378]: time="2024-02-12T19:18:09.343019939Z" level=info msg="TearDown network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\" successfully" Feb 12 19:18:09.344488 env[1378]: time="2024-02-12T19:18:09.343062299Z" level=info msg="StopPodSandbox for \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\" returns successfully" Feb 12 19:18:09.344488 env[1378]: time="2024-02-12T19:18:09.343637138Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-8lgvg,Uid:167d5c07-6115-4111-9a6f-d5cbc28dedbc,Namespace:kube-system,Attempt:1,}" Feb 12 19:18:09.344721 systemd[1]: run-netns-cni\x2d63636ead\x2de252\x2d1149\x2d5ed5\x2d75793af7108b.mount: Deactivated successfully. Feb 12 19:18:09.531714 systemd-networkd[1532]: calie7cfae7345c: Link UP Feb 12 19:18:09.550775 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:18:09.550934 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie7cfae7345c: link becomes ready Feb 12 19:18:09.553641 systemd-networkd[1532]: calie7cfae7345c: Gained carrier Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.440 [INFO][3893] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0 csi-node-driver- calico-system f43d848e-34cb-4479-97c9-1f49a005d06d 678 0 2024-02-12 19:17:44 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:7c77f88967 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-f1f3323662 csi-node-driver-tgqqb eth0 default [] [] [kns.calico-system ksa.calico-system.default] calie7cfae7345c [] []}} ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Namespace="calico-system" Pod="csi-node-driver-tgqqb" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.440 [INFO][3893] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Namespace="calico-system" Pod="csi-node-driver-tgqqb" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.475 [INFO][3916] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" HandleID="k8s-pod-network.d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.487 [INFO][3916] ipam_plugin.go 268: Auto assigning IP ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" HandleID="k8s-pod-network.d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000507a00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-f1f3323662", "pod":"csi-node-driver-tgqqb", "timestamp":"2024-02-12 19:18:09.475481233 +0000 UTC"}, Hostname:"ci-3510.3.2-a-f1f3323662", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.487 [INFO][3916] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.488 [INFO][3916] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.488 [INFO][3916] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-f1f3323662' Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.495 [INFO][3916] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.500 [INFO][3916] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.504 [INFO][3916] ipam.go 489: Trying affinity for 192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.506 [INFO][3916] ipam.go 155: Attempting to load block cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.508 [INFO][3916] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.508 [INFO][3916] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.510 [INFO][3916] ipam.go 1682: Creating new handle: k8s-pod-network.d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5 Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.514 [INFO][3916] ipam.go 1203: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.522 [INFO][3916] ipam.go 1216: Successfully claimed IPs: [192.168.106.129/26] block=192.168.106.128/26 handle="k8s-pod-network.d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.522 [INFO][3916] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.106.129/26] handle="k8s-pod-network.d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.522 [INFO][3916] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:09.581773 env[1378]: 2024-02-12 19:18:09.522 [INFO][3916] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.106.129/26] IPv6=[] ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" HandleID="k8s-pod-network.d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.582525 env[1378]: 2024-02-12 19:18:09.524 [INFO][3893] k8s.go 385: Populated endpoint ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Namespace="calico-system" Pod="csi-node-driver-tgqqb" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f43d848e-34cb-4479-97c9-1f49a005d06d", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"", Pod:"csi-node-driver-tgqqb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.106.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie7cfae7345c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:09.582525 env[1378]: 2024-02-12 19:18:09.524 [INFO][3893] k8s.go 386: Calico CNI using IPs: [192.168.106.129/32] ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Namespace="calico-system" Pod="csi-node-driver-tgqqb" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.582525 env[1378]: 2024-02-12 19:18:09.524 [INFO][3893] dataplane_linux.go 68: Setting the host side veth name to calie7cfae7345c ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Namespace="calico-system" Pod="csi-node-driver-tgqqb" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.582525 env[1378]: 2024-02-12 19:18:09.555 [INFO][3893] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Namespace="calico-system" Pod="csi-node-driver-tgqqb" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.582525 env[1378]: 2024-02-12 19:18:09.559 [INFO][3893] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Namespace="calico-system" Pod="csi-node-driver-tgqqb" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f43d848e-34cb-4479-97c9-1f49a005d06d", ResourceVersion:"678", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5", Pod:"csi-node-driver-tgqqb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.106.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie7cfae7345c", MAC:"82:7e:51:f3:28:c9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:09.582525 env[1378]: 2024-02-12 19:18:09.580 [INFO][3893] k8s.go 491: Wrote updated endpoint to datastore ContainerID="d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5" Namespace="calico-system" Pod="csi-node-driver-tgqqb" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:09.602842 systemd-networkd[1532]: calib86209e193f: Link UP Feb 12 19:18:09.614674 systemd-networkd[1532]: calib86209e193f: Gained carrier Feb 12 19:18:09.615446 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib86209e193f: link becomes ready Feb 12 19:18:09.621289 env[1378]: time="2024-02-12T19:18:09.621229060Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:09.621519 env[1378]: time="2024-02-12T19:18:09.621493300Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:09.621619 env[1378]: time="2024-02-12T19:18:09.621598180Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:09.621989 env[1378]: time="2024-02-12T19:18:09.621945139Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5 pid=3949 runtime=io.containerd.runc.v2 Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.462 [INFO][3897] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0 coredns-787d4945fb- kube-system 167d5c07-6115-4111-9a6f-d5cbc28dedbc 679 0 2024-02-12 19:17:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-f1f3323662 coredns-787d4945fb-8lgvg eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib86209e193f [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Namespace="kube-system" Pod="coredns-787d4945fb-8lgvg" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.462 [INFO][3897] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Namespace="kube-system" Pod="coredns-787d4945fb-8lgvg" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.507 [INFO][3921] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" HandleID="k8s-pod-network.5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.528 [INFO][3921] ipam_plugin.go 268: Auto assigning IP ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" HandleID="k8s-pod-network.5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002d47c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-f1f3323662", "pod":"coredns-787d4945fb-8lgvg", "timestamp":"2024-02-12 19:18:09.507194609 +0000 UTC"}, Hostname:"ci-3510.3.2-a-f1f3323662", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.528 [INFO][3921] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.528 [INFO][3921] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.528 [INFO][3921] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-f1f3323662' Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.530 [INFO][3921] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.542 [INFO][3921] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.556 [INFO][3921] ipam.go 489: Trying affinity for 192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.564 [INFO][3921] ipam.go 155: Attempting to load block cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.566 [INFO][3921] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.566 [INFO][3921] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.568 [INFO][3921] ipam.go 1682: Creating new handle: k8s-pod-network.5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677 Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.571 [INFO][3921] ipam.go 1203: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.588 [INFO][3921] ipam.go 1216: Successfully claimed IPs: [192.168.106.130/26] block=192.168.106.128/26 handle="k8s-pod-network.5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.588 [INFO][3921] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.106.130/26] handle="k8s-pod-network.5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.588 [INFO][3921] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:09.628913 env[1378]: 2024-02-12 19:18:09.588 [INFO][3921] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.106.130/26] IPv6=[] ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" HandleID="k8s-pod-network.5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.629495 env[1378]: 2024-02-12 19:18:09.590 [INFO][3897] k8s.go 385: Populated endpoint ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Namespace="kube-system" Pod="coredns-787d4945fb-8lgvg" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"167d5c07-6115-4111-9a6f-d5cbc28dedbc", ResourceVersion:"679", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"", Pod:"coredns-787d4945fb-8lgvg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.106.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib86209e193f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:09.629495 env[1378]: 2024-02-12 19:18:09.590 [INFO][3897] k8s.go 386: Calico CNI using IPs: [192.168.106.130/32] ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Namespace="kube-system" Pod="coredns-787d4945fb-8lgvg" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.629495 env[1378]: 2024-02-12 19:18:09.590 [INFO][3897] dataplane_linux.go 68: Setting the host side veth name to calib86209e193f ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Namespace="kube-system" Pod="coredns-787d4945fb-8lgvg" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.629495 env[1378]: 2024-02-12 19:18:09.615 [INFO][3897] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Namespace="kube-system" Pod="coredns-787d4945fb-8lgvg" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.629495 env[1378]: 2024-02-12 19:18:09.615 [INFO][3897] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Namespace="kube-system" Pod="coredns-787d4945fb-8lgvg" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"167d5c07-6115-4111-9a6f-d5cbc28dedbc", ResourceVersion:"679", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677", Pod:"coredns-787d4945fb-8lgvg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.106.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib86209e193f", MAC:"c2:7a:72:90:04:c4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:09.629495 env[1378]: 2024-02-12 19:18:09.625 [INFO][3897] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677" Namespace="kube-system" Pod="coredns-787d4945fb-8lgvg" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:09.637000 audit[3974]: NETFILTER_CFG table=filter:118 family=2 entries=36 op=nft_register_chain pid=3974 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:09.644957 kernel: kauditd_printk_skb: 129 callbacks suppressed Feb 12 19:18:09.645017 kernel: audit: type=1325 audit(1707765489.637:1180): table=filter:118 family=2 entries=36 op=nft_register_chain pid=3974 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:09.637000 audit[3974]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffdfd66410 a2=0 a3=ffffaf30efa8 items=0 ppid=3709 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.697238 kernel: audit: type=1300 audit(1707765489.637:1180): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffdfd66410 a2=0 a3=ffffaf30efa8 items=0 ppid=3709 pid=3974 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.637000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:09.717532 kernel: audit: type=1327 audit(1707765489.637:1180): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:09.720100 systemd[1]: Started cri-containerd-d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5.scope. Feb 12 19:18:09.722000 audit[3998]: NETFILTER_CFG table=filter:119 family=2 entries=40 op=nft_register_chain pid=3998 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:09.742828 env[1378]: time="2024-02-12T19:18:09.742652976Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:09.742828 env[1378]: time="2024-02-12T19:18:09.742696776Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:09.742828 env[1378]: time="2024-02-12T19:18:09.742706616Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:09.743308 env[1378]: time="2024-02-12T19:18:09.743180975Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677 pid=3991 runtime=io.containerd.runc.v2 Feb 12 19:18:09.722000 audit[3998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffde9d3940 a2=0 a3=ffffb0133fa8 items=0 ppid=3709 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.777363 kernel: audit: type=1325 audit(1707765489.722:1181): table=filter:119 family=2 entries=40 op=nft_register_chain pid=3998 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:09.777550 kernel: audit: type=1300 audit(1707765489.722:1181): arch=c00000b7 syscall=211 success=yes exit=21096 a0=3 a1=ffffde9d3940 a2=0 a3=ffffb0133fa8 items=0 ppid=3709 pid=3998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.722000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:09.799626 kernel: audit: type=1327 audit(1707765489.722:1181): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.846826 kernel: audit: type=1400 audit(1707765489.777:1182): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.846967 kernel: audit: type=1400 audit(1707765489.777:1183): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.868929 kernel: audit: type=1400 audit(1707765489.777:1184): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.872474 systemd[1]: Started cri-containerd-5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677.scope. Feb 12 19:18:09.876581 env[1378]: time="2024-02-12T19:18:09.873263114Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-tgqqb,Uid:f43d848e-34cb-4479-97c9-1f49a005d06d,Namespace:calico-system,Attempt:1,} returns sandbox id \"d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5\"" Feb 12 19:18:09.894631 kernel: audit: type=1400 audit(1707765489.777:1185): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit: BPF prog-id=146 op=LOAD Feb 12 19:18:09.777000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.777000 audit[3960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001c5b38 a2=10 a3=0 items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.777000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313931653734323130333931663834363030353362356633626435 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001c55a0 a2=3c a3=0 items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313931653734323130333931663834363030353362356633626435 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit: BPF prog-id=147 op=LOAD Feb 12 19:18:09.778000 audit[3960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c58e0 a2=78 a3=0 items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313931653734323130333931663834363030353362356633626435 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit: BPF prog-id=148 op=LOAD Feb 12 19:18:09.778000 audit[3960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001c5670 a2=78 a3=0 items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313931653734323130333931663834363030353362356633626435 Feb 12 19:18:09.778000 audit: BPF prog-id=148 op=UNLOAD Feb 12 19:18:09.778000 audit: BPF prog-id=147 op=UNLOAD Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { perfmon } for pid=3960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit[3960]: AVC avc: denied { bpf } for pid=3960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.778000 audit: BPF prog-id=149 op=LOAD Feb 12 19:18:09.778000 audit[3960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001c5b40 a2=78 a3=0 items=0 ppid=3949 pid=3960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.778000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431313931653734323130333931663834363030353362356633626435 Feb 12 19:18:09.898774 env[1378]: time="2024-02-12T19:18:09.898739582Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit: BPF prog-id=150 op=LOAD Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3991 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563396538643430386261666636623435653936663661373261366233 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3991 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563396538643430386261666636623435653936663661373261366233 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.899000 audit: BPF prog-id=151 op=LOAD Feb 12 19:18:09.899000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3991 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.899000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563396538643430386261666636623435653936663661373261366233 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit: BPF prog-id=152 op=LOAD Feb 12 19:18:09.900000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3991 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563396538643430386261666636623435653936663661373261366233 Feb 12 19:18:09.900000 audit: BPF prog-id=152 op=UNLOAD Feb 12 19:18:09.900000 audit: BPF prog-id=151 op=UNLOAD Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { perfmon } for pid=4010 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit[4010]: AVC avc: denied { bpf } for pid=4010 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.900000 audit: BPF prog-id=153 op=LOAD Feb 12 19:18:09.900000 audit[4010]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3991 pid=4010 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.900000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3563396538643430386261666636623435653936663661373261366233 Feb 12 19:18:09.919631 env[1378]: time="2024-02-12T19:18:09.918760782Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-8lgvg,Uid:167d5c07-6115-4111-9a6f-d5cbc28dedbc,Namespace:kube-system,Attempt:1,} returns sandbox id \"5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677\"" Feb 12 19:18:09.922236 env[1378]: time="2024-02-12T19:18:09.922198415Z" level=info msg="CreateContainer within sandbox \"5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:18:09.954812 env[1378]: time="2024-02-12T19:18:09.954726590Z" level=info msg="CreateContainer within sandbox \"5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"dca713a5df873edea7902df5d5d6f4650b27dcf761d9b84b4dd43397d6fe9a2c\"" Feb 12 19:18:09.955509 env[1378]: time="2024-02-12T19:18:09.955485428Z" level=info msg="StartContainer for \"dca713a5df873edea7902df5d5d6f4650b27dcf761d9b84b4dd43397d6fe9a2c\"" Feb 12 19:18:09.968292 systemd[1]: Started cri-containerd-dca713a5df873edea7902df5d5d6f4650b27dcf761d9b84b4dd43397d6fe9a2c.scope. Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.981000 audit: BPF prog-id=154 op=LOAD Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3991 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613731336135646638373365646561373930326466356435643666 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3991 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613731336135646638373365646561373930326466356435643666 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit: BPF prog-id=155 op=LOAD Feb 12 19:18:09.982000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3991 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613731336135646638373365646561373930326466356435643666 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit: BPF prog-id=156 op=LOAD Feb 12 19:18:09.982000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3991 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613731336135646638373365646561373930326466356435643666 Feb 12 19:18:09.982000 audit: BPF prog-id=156 op=UNLOAD Feb 12 19:18:09.982000 audit: BPF prog-id=155 op=UNLOAD Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { perfmon } for pid=4044 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit[4044]: AVC avc: denied { bpf } for pid=4044 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.982000 audit: BPF prog-id=157 op=LOAD Feb 12 19:18:09.982000 audit[4044]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3991 pid=4044 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.982000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6463613731336135646638373365646561373930326466356435643666 Feb 12 19:18:10.001130 env[1378]: time="2024-02-12T19:18:10.001071977Z" level=info msg="StartContainer for \"dca713a5df873edea7902df5d5d6f4650b27dcf761d9b84b4dd43397d6fe9a2c\" returns successfully" Feb 12 19:18:10.200450 env[1378]: time="2024-02-12T19:18:10.200399500Z" level=info msg="StopPodSandbox for \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\"" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.252 [INFO][4087] k8s.go 578: Cleaning up netns ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.252 [INFO][4087] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" iface="eth0" netns="/var/run/netns/cni-97b250ac-ce4b-51ca-7bfd-76627ee42a7e" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.252 [INFO][4087] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" iface="eth0" netns="/var/run/netns/cni-97b250ac-ce4b-51ca-7bfd-76627ee42a7e" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.252 [INFO][4087] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" iface="eth0" netns="/var/run/netns/cni-97b250ac-ce4b-51ca-7bfd-76627ee42a7e" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.252 [INFO][4087] k8s.go 585: Releasing IP address(es) ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.252 [INFO][4087] utils.go 188: Calico CNI releasing IP address ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.271 [INFO][4093] ipam_plugin.go 415: Releasing address using handleID ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" HandleID="k8s-pod-network.838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.271 [INFO][4093] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.271 [INFO][4093] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.282 [WARNING][4093] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" HandleID="k8s-pod-network.838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.282 [INFO][4093] ipam_plugin.go 443: Releasing address using workloadID ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" HandleID="k8s-pod-network.838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.284 [INFO][4093] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:10.286288 env[1378]: 2024-02-12 19:18:10.285 [INFO][4087] k8s.go 591: Teardown processing complete. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:10.287123 env[1378]: time="2024-02-12T19:18:10.287085567Z" level=info msg="TearDown network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\" successfully" Feb 12 19:18:10.287198 env[1378]: time="2024-02-12T19:18:10.287183887Z" level=info msg="StopPodSandbox for \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\" returns successfully" Feb 12 19:18:10.288010 env[1378]: time="2024-02-12T19:18:10.287982366Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77b7ff686c-vh2cp,Uid:2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73,Namespace:calico-system,Attempt:1,}" Feb 12 19:18:10.329108 systemd[1]: run-netns-cni\x2d97b250ac\x2dce4b\x2d51ca\x2d7bfd\x2d76627ee42a7e.mount: Deactivated successfully. Feb 12 19:18:10.389354 kubelet[2548]: I0212 19:18:10.389215 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-8lgvg" podStartSLOduration=35.389176484 pod.CreationTimestamp="2024-02-12 19:17:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:18:10.362439777 +0000 UTC m=+49.412533798" watchObservedRunningTime="2024-02-12 19:18:10.389176484 +0000 UTC m=+49.439270505" Feb 12 19:18:10.454000 audit[4141]: NETFILTER_CFG table=filter:120 family=2 entries=12 op=nft_register_rule pid=4141 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:10.454000 audit[4141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4028 a0=3 a1=ffffde7626c0 a2=0 a3=ffff988366c0 items=0 ppid=2707 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.454000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:10.459000 audit[4141]: NETFILTER_CFG table=nat:121 family=2 entries=30 op=nft_register_rule pid=4141 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:10.459000 audit[4141]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8836 a0=3 a1=ffffde7626c0 a2=0 a3=ffff988366c0 items=0 ppid=2707 pid=4141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.459000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:10.483986 systemd-networkd[1532]: cali6b81222ebfe: Link UP Feb 12 19:18:10.494456 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali6b81222ebfe: link becomes ready Feb 12 19:18:10.495110 systemd-networkd[1532]: cali6b81222ebfe: Gained carrier Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.408 [INFO][4100] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0 calico-kube-controllers-77b7ff686c- calico-system 2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73 694 0 2024-02-12 19:17:44 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:77b7ff686c projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-f1f3323662 calico-kube-controllers-77b7ff686c-vh2cp eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali6b81222ebfe [] []}} ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Namespace="calico-system" Pod="calico-kube-controllers-77b7ff686c-vh2cp" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.408 [INFO][4100] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Namespace="calico-system" Pod="calico-kube-controllers-77b7ff686c-vh2cp" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.437 [INFO][4117] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" HandleID="k8s-pod-network.2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.449 [INFO][4117] ipam_plugin.go 268: Auto assigning IP ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" HandleID="k8s-pod-network.2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002bd730), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-f1f3323662", "pod":"calico-kube-controllers-77b7ff686c-vh2cp", "timestamp":"2024-02-12 19:18:10.437496868 +0000 UTC"}, Hostname:"ci-3510.3.2-a-f1f3323662", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.449 [INFO][4117] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.449 [INFO][4117] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.450 [INFO][4117] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-f1f3323662' Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.451 [INFO][4117] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.456 [INFO][4117] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.462 [INFO][4117] ipam.go 489: Trying affinity for 192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.464 [INFO][4117] ipam.go 155: Attempting to load block cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.466 [INFO][4117] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.466 [INFO][4117] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.468 [INFO][4117] ipam.go 1682: Creating new handle: k8s-pod-network.2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41 Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.471 [INFO][4117] ipam.go 1203: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.475 [INFO][4117] ipam.go 1216: Successfully claimed IPs: [192.168.106.131/26] block=192.168.106.128/26 handle="k8s-pod-network.2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.476 [INFO][4117] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.106.131/26] handle="k8s-pod-network.2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.476 [INFO][4117] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:10.505548 env[1378]: 2024-02-12 19:18:10.476 [INFO][4117] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.106.131/26] IPv6=[] ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" HandleID="k8s-pod-network.2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.506141 env[1378]: 2024-02-12 19:18:10.477 [INFO][4100] k8s.go 385: Populated endpoint ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Namespace="calico-system" Pod="calico-kube-controllers-77b7ff686c-vh2cp" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0", GenerateName:"calico-kube-controllers-77b7ff686c-", Namespace:"calico-system", SelfLink:"", UID:"2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77b7ff686c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"", Pod:"calico-kube-controllers-77b7ff686c-vh2cp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.106.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6b81222ebfe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:10.506141 env[1378]: 2024-02-12 19:18:10.477 [INFO][4100] k8s.go 386: Calico CNI using IPs: [192.168.106.131/32] ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Namespace="calico-system" Pod="calico-kube-controllers-77b7ff686c-vh2cp" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.506141 env[1378]: 2024-02-12 19:18:10.477 [INFO][4100] dataplane_linux.go 68: Setting the host side veth name to cali6b81222ebfe ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Namespace="calico-system" Pod="calico-kube-controllers-77b7ff686c-vh2cp" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.506141 env[1378]: 2024-02-12 19:18:10.484 [INFO][4100] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Namespace="calico-system" Pod="calico-kube-controllers-77b7ff686c-vh2cp" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.506141 env[1378]: 2024-02-12 19:18:10.494 [INFO][4100] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Namespace="calico-system" Pod="calico-kube-controllers-77b7ff686c-vh2cp" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0", GenerateName:"calico-kube-controllers-77b7ff686c-", Namespace:"calico-system", SelfLink:"", UID:"2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73", ResourceVersion:"694", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77b7ff686c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41", Pod:"calico-kube-controllers-77b7ff686c-vh2cp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.106.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6b81222ebfe", MAC:"22:c3:3c:c2:1d:f9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:10.506141 env[1378]: 2024-02-12 19:18:10.503 [INFO][4100] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41" Namespace="calico-system" Pod="calico-kube-controllers-77b7ff686c-vh2cp" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:10.519741 env[1378]: time="2024-02-12T19:18:10.519684144Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:10.519929 env[1378]: time="2024-02-12T19:18:10.519905344Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:10.520013 env[1378]: time="2024-02-12T19:18:10.519993144Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:10.520211 env[1378]: time="2024-02-12T19:18:10.520184583Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41 pid=4171 runtime=io.containerd.runc.v2 Feb 12 19:18:10.538000 audit[4190]: NETFILTER_CFG table=filter:122 family=2 entries=38 op=nft_register_chain pid=4190 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:10.538000 audit[4190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19508 a0=3 a1=ffffd5d56ea0 a2=0 a3=ffffbc791fa8 items=0 ppid=3709 pid=4190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.538000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:10.546118 systemd[1]: Started cri-containerd-2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41.scope. Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.570000 audit: BPF prog-id=158 op=LOAD Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4171 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353930313964376137313234633566613166353966323861303031 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4171 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353930313964376137313234633566613166353966323861303031 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit: BPF prog-id=159 op=LOAD Feb 12 19:18:10.571000 audit[4181]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4171 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353930313964376137313234633566613166353966323861303031 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit: BPF prog-id=160 op=LOAD Feb 12 19:18:10.571000 audit[4181]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4171 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353930313964376137313234633566613166353966323861303031 Feb 12 19:18:10.571000 audit: BPF prog-id=160 op=UNLOAD Feb 12 19:18:10.571000 audit: BPF prog-id=159 op=UNLOAD Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { perfmon } for pid=4181 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit[4181]: AVC avc: denied { bpf } for pid=4181 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.571000 audit: BPF prog-id=161 op=LOAD Feb 12 19:18:10.571000 audit[4181]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4171 pid=4181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3237353930313964376137313234633566613166353966323861303031 Feb 12 19:18:10.590000 audit[4221]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:10.590000 audit[4221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe1cdc1a0 a2=0 a3=ffff9648c6c0 items=0 ppid=2707 pid=4221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.590000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:10.597153 env[1378]: time="2024-02-12T19:18:10.597113670Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-77b7ff686c-vh2cp,Uid:2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73,Namespace:calico-system,Attempt:1,} returns sandbox id \"2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41\"" Feb 12 19:18:10.592000 audit[4221]: NETFILTER_CFG table=nat:124 family=2 entries=51 op=nft_register_chain pid=4221 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:10.592000 audit[4221]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=ffffe1cdc1a0 a2=0 a3=ffff9648c6c0 items=0 ppid=2707 pid=4221 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.592000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:10.619615 systemd-networkd[1532]: calie7cfae7345c: Gained IPv6LL Feb 12 19:18:11.067652 systemd-networkd[1532]: calib86209e193f: Gained IPv6LL Feb 12 19:18:11.329106 systemd[1]: run-containerd-runc-k8s.io-2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41-runc.BlsB9l.mount: Deactivated successfully. Feb 12 19:18:11.416031 env[1378]: time="2024-02-12T19:18:11.415979607Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:11.424086 env[1378]: time="2024-02-12T19:18:11.424043991Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:11.429678 env[1378]: time="2024-02-12T19:18:11.429625620Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:11.437482 env[1378]: time="2024-02-12T19:18:11.437453125Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:11.437780 env[1378]: time="2024-02-12T19:18:11.437751564Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:18:11.440495 env[1378]: time="2024-02-12T19:18:11.440464799Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:18:11.442018 env[1378]: time="2024-02-12T19:18:11.441988876Z" level=info msg="CreateContainer within sandbox \"d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:18:11.477081 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1114298362.mount: Deactivated successfully. Feb 12 19:18:11.492501 env[1378]: time="2024-02-12T19:18:11.492452897Z" level=info msg="CreateContainer within sandbox \"d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"ea19aa4d1953707ebc0194557fad3064985b38206dd366faff97dbe070988229\"" Feb 12 19:18:11.494883 env[1378]: time="2024-02-12T19:18:11.493155455Z" level=info msg="StartContainer for \"ea19aa4d1953707ebc0194557fad3064985b38206dd366faff97dbe070988229\"" Feb 12 19:18:11.512585 systemd[1]: Started cri-containerd-ea19aa4d1953707ebc0194557fad3064985b38206dd366faff97dbe070988229.scope. Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3949 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313961613464313935333730376562633031393435353766616433 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit: BPF prog-id=162 op=LOAD Feb 12 19:18:11.570000 audit[4240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3949 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313961613464313935333730376562633031393435353766616433 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.570000 audit: BPF prog-id=163 op=LOAD Feb 12 19:18:11.570000 audit[4240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3949 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.570000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313961613464313935333730376562633031393435353766616433 Feb 12 19:18:11.571000 audit: BPF prog-id=163 op=UNLOAD Feb 12 19:18:11.571000 audit: BPF prog-id=162 op=UNLOAD Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { perfmon } for pid=4240 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit[4240]: AVC avc: denied { bpf } for pid=4240 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.571000 audit: BPF prog-id=164 op=LOAD Feb 12 19:18:11.571000 audit[4240]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3949 pid=4240 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.571000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313961613464313935333730376562633031393435353766616433 Feb 12 19:18:11.619846 env[1378]: time="2024-02-12T19:18:11.619758845Z" level=info msg="StartContainer for \"ea19aa4d1953707ebc0194557fad3064985b38206dd366faff97dbe070988229\" returns successfully" Feb 12 19:18:12.200431 env[1378]: time="2024-02-12T19:18:12.200372384Z" level=info msg="StopPodSandbox for \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\"" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.241 [INFO][4281] k8s.go 578: Cleaning up netns ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.241 [INFO][4281] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" iface="eth0" netns="/var/run/netns/cni-7a0c4e7e-59e2-39f8-a93f-f5dc3947d2e4" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.241 [INFO][4281] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" iface="eth0" netns="/var/run/netns/cni-7a0c4e7e-59e2-39f8-a93f-f5dc3947d2e4" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.242 [INFO][4281] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" iface="eth0" netns="/var/run/netns/cni-7a0c4e7e-59e2-39f8-a93f-f5dc3947d2e4" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.242 [INFO][4281] k8s.go 585: Releasing IP address(es) ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.242 [INFO][4281] utils.go 188: Calico CNI releasing IP address ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.257 [INFO][4287] ipam_plugin.go 415: Releasing address using handleID ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" HandleID="k8s-pod-network.986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.257 [INFO][4287] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.257 [INFO][4287] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.268 [WARNING][4287] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" HandleID="k8s-pod-network.986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.269 [INFO][4287] ipam_plugin.go 443: Releasing address using workloadID ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" HandleID="k8s-pod-network.986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.270 [INFO][4287] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:12.272248 env[1378]: 2024-02-12 19:18:12.271 [INFO][4281] k8s.go 591: Teardown processing complete. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:12.272915 env[1378]: time="2024-02-12T19:18:12.272879162Z" level=info msg="TearDown network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\" successfully" Feb 12 19:18:12.273010 env[1378]: time="2024-02-12T19:18:12.272992722Z" level=info msg="StopPodSandbox for \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\" returns successfully" Feb 12 19:18:12.273775 env[1378]: time="2024-02-12T19:18:12.273749720Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-bqggh,Uid:9f3b6520-f0dd-4025-8b27-732678b24b50,Namespace:kube-system,Attempt:1,}" Feb 12 19:18:12.330178 systemd[1]: run-netns-cni\x2d7a0c4e7e\x2d59e2\x2d39f8\x2da93f\x2df5dc3947d2e4.mount: Deactivated successfully. Feb 12 19:18:12.411549 systemd-networkd[1532]: cali6b81222ebfe: Gained IPv6LL Feb 12 19:18:12.424191 systemd-networkd[1532]: calie9e7b2cf2fc: Link UP Feb 12 19:18:12.440197 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:18:12.440328 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calie9e7b2cf2fc: link becomes ready Feb 12 19:18:12.441620 systemd-networkd[1532]: calie9e7b2cf2fc: Gained carrier Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.350 [INFO][4293] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0 coredns-787d4945fb- kube-system 9f3b6520-f0dd-4025-8b27-732678b24b50 716 0 2024-02-12 19:17:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:787d4945fb projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-f1f3323662 coredns-787d4945fb-bqggh eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calie9e7b2cf2fc [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Namespace="kube-system" Pod="coredns-787d4945fb-bqggh" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.350 [INFO][4293] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Namespace="kube-system" Pod="coredns-787d4945fb-bqggh" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.377 [INFO][4304] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" HandleID="k8s-pod-network.6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.390 [INFO][4304] ipam_plugin.go 268: Auto assigning IP ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" HandleID="k8s-pod-network.6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b39a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-f1f3323662", "pod":"coredns-787d4945fb-bqggh", "timestamp":"2024-02-12 19:18:12.377883997 +0000 UTC"}, Hostname:"ci-3510.3.2-a-f1f3323662", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.390 [INFO][4304] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.390 [INFO][4304] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.390 [INFO][4304] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-f1f3323662' Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.391 [INFO][4304] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.394 [INFO][4304] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.404 [INFO][4304] ipam.go 489: Trying affinity for 192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.407 [INFO][4304] ipam.go 155: Attempting to load block cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.409 [INFO][4304] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.409 [INFO][4304] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.410 [INFO][4304] ipam.go 1682: Creating new handle: k8s-pod-network.6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350 Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.413 [INFO][4304] ipam.go 1203: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.419 [INFO][4304] ipam.go 1216: Successfully claimed IPs: [192.168.106.132/26] block=192.168.106.128/26 handle="k8s-pod-network.6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.419 [INFO][4304] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.106.132/26] handle="k8s-pod-network.6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.419 [INFO][4304] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:12.452647 env[1378]: 2024-02-12 19:18:12.419 [INFO][4304] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.106.132/26] IPv6=[] ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" HandleID="k8s-pod-network.6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.453377 env[1378]: 2024-02-12 19:18:12.421 [INFO][4293] k8s.go 385: Populated endpoint ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Namespace="kube-system" Pod="coredns-787d4945fb-bqggh" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9f3b6520-f0dd-4025-8b27-732678b24b50", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"", Pod:"coredns-787d4945fb-bqggh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.106.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9e7b2cf2fc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:12.453377 env[1378]: 2024-02-12 19:18:12.421 [INFO][4293] k8s.go 386: Calico CNI using IPs: [192.168.106.132/32] ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Namespace="kube-system" Pod="coredns-787d4945fb-bqggh" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.453377 env[1378]: 2024-02-12 19:18:12.421 [INFO][4293] dataplane_linux.go 68: Setting the host side veth name to calie9e7b2cf2fc ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Namespace="kube-system" Pod="coredns-787d4945fb-bqggh" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.453377 env[1378]: 2024-02-12 19:18:12.441 [INFO][4293] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Namespace="kube-system" Pod="coredns-787d4945fb-bqggh" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.453377 env[1378]: 2024-02-12 19:18:12.442 [INFO][4293] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Namespace="kube-system" Pod="coredns-787d4945fb-bqggh" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9f3b6520-f0dd-4025-8b27-732678b24b50", ResourceVersion:"716", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350", Pod:"coredns-787d4945fb-bqggh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.106.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9e7b2cf2fc", MAC:"f6:7c:a9:95:0f:f6", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:12.453377 env[1378]: 2024-02-12 19:18:12.450 [INFO][4293] k8s.go 491: Wrote updated endpoint to datastore ContainerID="6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350" Namespace="kube-system" Pod="coredns-787d4945fb-bqggh" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:12.464000 audit[4323]: NETFILTER_CFG table=filter:125 family=2 entries=44 op=nft_register_chain pid=4323 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:12.464000 audit[4323]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=21940 a0=3 a1=ffffc142a9a0 a2=0 a3=ffff8e249fa8 items=0 ppid=3709 pid=4323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.464000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:12.472885 env[1378]: time="2024-02-12T19:18:12.472807051Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:12.472885 env[1378]: time="2024-02-12T19:18:12.472849451Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:12.473106 env[1378]: time="2024-02-12T19:18:12.472868331Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:12.473396 env[1378]: time="2024-02-12T19:18:12.473350090Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350 pid=4332 runtime=io.containerd.runc.v2 Feb 12 19:18:12.493874 systemd[1]: run-containerd-runc-k8s.io-6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350-runc.6S0vvU.mount: Deactivated successfully. Feb 12 19:18:12.498522 systemd[1]: Started cri-containerd-6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350.scope. Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.511000 audit: BPF prog-id=165 op=LOAD Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662313731316630383935396230653864616264666563663162303261 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662313731316630383935396230653864616264666563663162303261 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.512000 audit: BPF prog-id=166 op=LOAD Feb 12 19:18:12.512000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662313731316630383935396230653864616264666563663162303261 Feb 12 19:18:12.517000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.517000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.517000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.517000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.517000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.517000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.517000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.517000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.517000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.517000 audit: BPF prog-id=167 op=LOAD Feb 12 19:18:12.517000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.517000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662313731316630383935396230653864616264666563663162303261 Feb 12 19:18:12.517000 audit: BPF prog-id=167 op=UNLOAD Feb 12 19:18:12.518000 audit: BPF prog-id=166 op=UNLOAD Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { perfmon } for pid=4342 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit[4342]: AVC avc: denied { bpf } for pid=4342 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.518000 audit: BPF prog-id=168 op=LOAD Feb 12 19:18:12.518000 audit[4342]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4332 pid=4342 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.518000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3662313731316630383935396230653864616264666563663162303261 Feb 12 19:18:12.538904 kubelet[2548]: I0212 19:18:12.538050 2548 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:18:12.581119 env[1378]: time="2024-02-12T19:18:12.543119794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-787d4945fb-bqggh,Uid:9f3b6520-f0dd-4025-8b27-732678b24b50,Namespace:kube-system,Attempt:1,} returns sandbox id \"6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350\"" Feb 12 19:18:12.582857 env[1378]: time="2024-02-12T19:18:12.582820956Z" level=info msg="CreateContainer within sandbox \"6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:18:12.670090 env[1378]: time="2024-02-12T19:18:12.670030825Z" level=info msg="CreateContainer within sandbox \"6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"ea193b84cbcbf940059655c99be5a560cc9159075e5cb69fbfb13dcc1661219e\"" Feb 12 19:18:12.670954 env[1378]: time="2024-02-12T19:18:12.670924984Z" level=info msg="StartContainer for \"ea193b84cbcbf940059655c99be5a560cc9159075e5cb69fbfb13dcc1661219e\"" Feb 12 19:18:12.686529 systemd[1]: Started cri-containerd-ea193b84cbcbf940059655c99be5a560cc9159075e5cb69fbfb13dcc1661219e.scope. Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.699000 audit: BPF prog-id=169 op=LOAD Feb 12 19:18:12.700000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.700000 audit[4419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4332 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313933623834636263626639343030353936353563393962653561 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4332 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313933623834636263626639343030353936353563393962653561 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit: BPF prog-id=170 op=LOAD Feb 12 19:18:12.701000 audit[4419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4332 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313933623834636263626639343030353936353563393962653561 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit: BPF prog-id=171 op=LOAD Feb 12 19:18:12.701000 audit[4419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4332 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313933623834636263626639343030353936353563393962653561 Feb 12 19:18:12.701000 audit: BPF prog-id=171 op=UNLOAD Feb 12 19:18:12.701000 audit: BPF prog-id=170 op=UNLOAD Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { perfmon } for pid=4419 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit[4419]: AVC avc: denied { bpf } for pid=4419 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:12.701000 audit: BPF prog-id=172 op=LOAD Feb 12 19:18:12.701000 audit[4419]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4332 pid=4419 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.701000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561313933623834636263626639343030353936353563393962653561 Feb 12 19:18:12.725766 env[1378]: time="2024-02-12T19:18:12.725716837Z" level=info msg="StartContainer for \"ea193b84cbcbf940059655c99be5a560cc9159075e5cb69fbfb13dcc1661219e\" returns successfully" Feb 12 19:18:13.380247 kubelet[2548]: I0212 19:18:13.380211 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-787d4945fb-bqggh" podStartSLOduration=38.380175964 pod.CreationTimestamp="2024-02-12 19:17:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:18:13.379862004 +0000 UTC m=+52.429956025" watchObservedRunningTime="2024-02-12 19:18:13.380175964 +0000 UTC m=+52.430269945" Feb 12 19:18:13.414000 audit[4474]: NETFILTER_CFG table=filter:126 family=2 entries=6 op=nft_register_rule pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:13.414000 audit[4474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffe169bf40 a2=0 a3=ffffa2d696c0 items=0 ppid=2707 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:13.414000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:13.416000 audit[4474]: NETFILTER_CFG table=nat:127 family=2 entries=60 op=nft_register_rule pid=4474 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:13.416000 audit[4474]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19324 a0=3 a1=ffffe169bf40 a2=0 a3=ffffa2d696c0 items=0 ppid=2707 pid=4474 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:13.416000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:14.271338 env[1378]: time="2024-02-12T19:18:14.270908802Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:14.279233 env[1378]: time="2024-02-12T19:18:14.279192866Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:14.283332 env[1378]: time="2024-02-12T19:18:14.283280699Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:14.287834 env[1378]: time="2024-02-12T19:18:14.287802210Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:14.288198 env[1378]: time="2024-02-12T19:18:14.288168449Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 12 19:18:14.290586 env[1378]: time="2024-02-12T19:18:14.289045807Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:18:14.303191 env[1378]: time="2024-02-12T19:18:14.303152500Z" level=info msg="CreateContainer within sandbox \"2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:18:14.332905 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1886405021.mount: Deactivated successfully. Feb 12 19:18:14.352968 env[1378]: time="2024-02-12T19:18:14.352922405Z" level=info msg="CreateContainer within sandbox \"2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235\"" Feb 12 19:18:14.355566 env[1378]: time="2024-02-12T19:18:14.355526800Z" level=info msg="StartContainer for \"7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235\"" Feb 12 19:18:14.395992 systemd-networkd[1532]: calie9e7b2cf2fc: Gained IPv6LL Feb 12 19:18:14.397951 systemd[1]: Started cri-containerd-7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235.scope. Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.416000 audit: BPF prog-id=173 op=LOAD Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4171 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363466353534323236663936613938643036373466366136646164 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4171 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363466353534323236663936613938643036373466366136646164 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit: BPF prog-id=174 op=LOAD Feb 12 19:18:14.417000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4171 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363466353534323236663936613938643036373466366136646164 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit: BPF prog-id=175 op=LOAD Feb 12 19:18:14.417000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4171 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363466353534323236663936613938643036373466366136646164 Feb 12 19:18:14.417000 audit: BPF prog-id=175 op=UNLOAD Feb 12 19:18:14.417000 audit: BPF prog-id=174 op=UNLOAD Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { perfmon } for pid=4484 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit[4484]: AVC avc: denied { bpf } for pid=4484 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.417000 audit: BPF prog-id=176 op=LOAD Feb 12 19:18:14.417000 audit[4484]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4171 pid=4484 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734363466353534323236663936613938643036373466366136646164 Feb 12 19:18:14.445261 env[1378]: time="2024-02-12T19:18:14.445203907Z" level=info msg="StartContainer for \"7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235\" returns successfully" Feb 12 19:18:14.479000 audit[4536]: NETFILTER_CFG table=filter:128 family=2 entries=6 op=nft_register_rule pid=4536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:14.479000 audit[4536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffd6385d80 a2=0 a3=ffffa21326c0 items=0 ppid=2707 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.479000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:14.487000 audit[4536]: NETFILTER_CFG table=nat:129 family=2 entries=72 op=nft_register_chain pid=4536 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:14.487000 audit[4536]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffd6385d80 a2=0 a3=ffffa21326c0 items=0 ppid=2707 pid=4536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:15.330093 systemd[1]: run-containerd-runc-k8s.io-7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235-runc.PDyt0P.mount: Deactivated successfully. Feb 12 19:18:15.417004 systemd[1]: run-containerd-runc-k8s.io-7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235-runc.E73uV3.mount: Deactivated successfully. Feb 12 19:18:15.482200 kubelet[2548]: I0212 19:18:15.482142 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-77b7ff686c-vh2cp" podStartSLOduration=-9.223372005372671e+09 pod.CreationTimestamp="2024-02-12 19:17:44 +0000 UTC" firstStartedPulling="2024-02-12 19:18:10.598545667 +0000 UTC m=+49.648639688" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:18:15.409930141 +0000 UTC m=+54.460024162" watchObservedRunningTime="2024-02-12 19:18:15.482104243 +0000 UTC m=+54.532198264" Feb 12 19:18:15.663429 env[1378]: time="2024-02-12T19:18:15.663305418Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:15.670126 env[1378]: time="2024-02-12T19:18:15.670080405Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:15.676609 env[1378]: time="2024-02-12T19:18:15.676569313Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:15.681576 env[1378]: time="2024-02-12T19:18:15.681538463Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:15.681962 env[1378]: time="2024-02-12T19:18:15.681932663Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:18:15.683902 env[1378]: time="2024-02-12T19:18:15.683866899Z" level=info msg="CreateContainer within sandbox \"d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:18:15.726449 env[1378]: time="2024-02-12T19:18:15.726364618Z" level=info msg="CreateContainer within sandbox \"d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"93c30183caf7580a8b636d3592909962daca23ffd94ef92005dee8103bf9b2a1\"" Feb 12 19:18:15.727259 env[1378]: time="2024-02-12T19:18:15.727235776Z" level=info msg="StartContainer for \"93c30183caf7580a8b636d3592909962daca23ffd94ef92005dee8103bf9b2a1\"" Feb 12 19:18:15.748701 systemd[1]: Started cri-containerd-93c30183caf7580a8b636d3592909962daca23ffd94ef92005dee8103bf9b2a1.scope. Feb 12 19:18:15.785479 kernel: kauditd_printk_skb: 468 callbacks suppressed Feb 12 19:18:15.785617 kernel: audit: type=1400 audit(1707765495.769:1324): avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3949 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:15.824311 kernel: audit: type=1300 audit(1707765495.769:1324): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3949 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:15.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633330313833636166373538306138623633366433353932393039 Feb 12 19:18:15.852023 kernel: audit: type=1327 audit(1707765495.769:1324): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633330313833636166373538306138623633366433353932393039 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.871314 kernel: audit: type=1400 audit(1707765495.769:1325): avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.894260 kernel: audit: type=1400 audit(1707765495.769:1325): avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.916597 kernel: audit: type=1400 audit(1707765495.769:1325): avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.939217 kernel: audit: type=1400 audit(1707765495.769:1325): avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.959224 kernel: audit: type=1400 audit(1707765495.769:1325): avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.978991 kernel: audit: type=1400 audit(1707765495.769:1325): avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.979459 env[1378]: time="2024-02-12T19:18:15.979402216Z" level=info msg="StartContainer for \"93c30183caf7580a8b636d3592909962daca23ffd94ef92005dee8103bf9b2a1\" returns successfully" Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.999368 kernel: audit: type=1400 audit(1707765495.769:1325): avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit: BPF prog-id=177 op=LOAD Feb 12 19:18:15.769000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3949 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:15.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633330313833636166373538306138623633366433353932393039 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit: BPF prog-id=178 op=LOAD Feb 12 19:18:15.769000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3949 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:15.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633330313833636166373538306138623633366433353932393039 Feb 12 19:18:15.769000 audit: BPF prog-id=178 op=UNLOAD Feb 12 19:18:15.769000 audit: BPF prog-id=177 op=UNLOAD Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { perfmon } for pid=4565 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit[4565]: AVC avc: denied { bpf } for pid=4565 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.769000 audit: BPF prog-id=179 op=LOAD Feb 12 19:18:15.769000 audit[4565]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3949 pid=4565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:15.769000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3933633330313833636166373538306138623633366433353932393039 Feb 12 19:18:16.238344 kubelet[2548]: I0212 19:18:16.238306 2548 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:18:16.238344 kubelet[2548]: I0212 19:18:16.238336 2548 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:18:16.397971 kubelet[2548]: I0212 19:18:16.397934 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-tgqqb" podStartSLOduration=-9.223372004456879e+09 pod.CreationTimestamp="2024-02-12 19:17:44 +0000 UTC" firstStartedPulling="2024-02-12 19:18:09.897557105 +0000 UTC m=+48.947651126" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:18:16.396284228 +0000 UTC m=+55.446378249" watchObservedRunningTime="2024-02-12 19:18:16.397896625 +0000 UTC m=+55.447990646" Feb 12 19:18:17.196000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:17.196000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:17.196000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014e26f0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:18:17.196000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:17.196000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4001190640 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:18:17.196000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:17.452509 kubelet[2548]: I0212 19:18:17.452396 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:18:17.457471 systemd[1]: Created slice kubepods-besteffort-podf48b881f_38c3_45c6_a874_29c291ba13b6.slice. Feb 12 19:18:17.471522 kubelet[2548]: I0212 19:18:17.471494 2548 topology_manager.go:210] "Topology Admit Handler" Feb 12 19:18:17.476541 systemd[1]: Created slice kubepods-besteffort-pode09f5510_aa03_4ac2_8147_86c487f89537.slice. Feb 12 19:18:17.521000 audit[4629]: NETFILTER_CFG table=filter:130 family=2 entries=7 op=nft_register_rule pid=4629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:17.521000 audit[4629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffe929aec0 a2=0 a3=ffff9b0c56c0 items=0 ppid=2707 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:17.521000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:17.522000 audit[4629]: NETFILTER_CFG table=nat:131 family=2 entries=78 op=nft_register_rule pid=4629 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:17.522000 audit[4629]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffe929aec0 a2=0 a3=ffff9b0c56c0 items=0 ppid=2707 pid=4629 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:17.522000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:17.565000 audit[4655]: NETFILTER_CFG table=filter:132 family=2 entries=8 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:17.565000 audit[4655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffffe9520a0 a2=0 a3=ffff8b10f6c0 items=0 ppid=2707 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:17.565000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:17.567000 audit[4655]: NETFILTER_CFG table=nat:133 family=2 entries=78 op=nft_register_rule pid=4655 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:17.567000 audit[4655]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffffe9520a0 a2=0 a3=ffff8b10f6c0 items=0 ppid=2707 pid=4655 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:17.567000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:17.650722 kubelet[2548]: I0212 19:18:17.650682 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/f48b881f-38c3-45c6-a874-29c291ba13b6-calico-apiserver-certs\") pod \"calico-apiserver-7769dd965f-x4fvm\" (UID: \"f48b881f-38c3-45c6-a874-29c291ba13b6\") " pod="calico-apiserver/calico-apiserver-7769dd965f-x4fvm" Feb 12 19:18:17.650881 kubelet[2548]: I0212 19:18:17.650733 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e09f5510-aa03-4ac2-8147-86c487f89537-calico-apiserver-certs\") pod \"calico-apiserver-7769dd965f-9ljgm\" (UID: \"e09f5510-aa03-4ac2-8147-86c487f89537\") " pod="calico-apiserver/calico-apiserver-7769dd965f-9ljgm" Feb 12 19:18:17.650881 kubelet[2548]: I0212 19:18:17.650761 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t9hsw\" (UniqueName: \"kubernetes.io/projected/f48b881f-38c3-45c6-a874-29c291ba13b6-kube-api-access-t9hsw\") pod \"calico-apiserver-7769dd965f-x4fvm\" (UID: \"f48b881f-38c3-45c6-a874-29c291ba13b6\") " pod="calico-apiserver/calico-apiserver-7769dd965f-x4fvm" Feb 12 19:18:17.650881 kubelet[2548]: I0212 19:18:17.650786 2548 reconciler_common.go:253] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-mswcn\" (UniqueName: \"kubernetes.io/projected/e09f5510-aa03-4ac2-8147-86c487f89537-kube-api-access-mswcn\") pod \"calico-apiserver-7769dd965f-9ljgm\" (UID: \"e09f5510-aa03-4ac2-8147-86c487f89537\") " pod="calico-apiserver/calico-apiserver-7769dd965f-9ljgm" Feb 12 19:18:17.751933 kubelet[2548]: E0212 19:18:17.751809 2548 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:18:17.751933 kubelet[2548]: E0212 19:18:17.751898 2548 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e09f5510-aa03-4ac2-8147-86c487f89537-calico-apiserver-certs podName:e09f5510-aa03-4ac2-8147-86c487f89537 nodeName:}" failed. No retries permitted until 2024-02-12 19:18:18.251880278 +0000 UTC m=+57.301974299 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e09f5510-aa03-4ac2-8147-86c487f89537-calico-apiserver-certs") pod "calico-apiserver-7769dd965f-9ljgm" (UID: "e09f5510-aa03-4ac2-8147-86c487f89537") : secret "calico-apiserver-certs" not found Feb 12 19:18:17.752128 kubelet[2548]: E0212 19:18:17.751961 2548 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:18:17.752128 kubelet[2548]: E0212 19:18:17.751989 2548 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f48b881f-38c3-45c6-a874-29c291ba13b6-calico-apiserver-certs podName:f48b881f-38c3-45c6-a874-29c291ba13b6 nodeName:}" failed. No retries permitted until 2024-02-12 19:18:18.251978598 +0000 UTC m=+57.302072619 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/f48b881f-38c3-45c6-a874-29c291ba13b6-calico-apiserver-certs") pod "calico-apiserver-7769dd965f-x4fvm" (UID: "f48b881f-38c3-45c6-a874-29c291ba13b6") : secret "calico-apiserver-certs" not found Feb 12 19:18:17.759000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:17.759000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=400ef58690 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:18:17.759000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:17.762000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:17.762000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400d300450 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:18:17.762000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:17.762000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:17.762000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=70 a1=400d300480 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:18:17.762000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:17.764000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:17.764000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6e a1=4001949120 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:18:17.764000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:17.851000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:17.851000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400f630030 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:18:17.851000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:17.851000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:17.851000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=4002455960 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:18:17.851000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:18.255156 kubelet[2548]: E0212 19:18:18.255113 2548 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:18:18.255331 kubelet[2548]: E0212 19:18:18.255183 2548 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e09f5510-aa03-4ac2-8147-86c487f89537-calico-apiserver-certs podName:e09f5510-aa03-4ac2-8147-86c487f89537 nodeName:}" failed. No retries permitted until 2024-02-12 19:18:19.255168659 +0000 UTC m=+58.305262680 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e09f5510-aa03-4ac2-8147-86c487f89537-calico-apiserver-certs") pod "calico-apiserver-7769dd965f-9ljgm" (UID: "e09f5510-aa03-4ac2-8147-86c487f89537") : secret "calico-apiserver-certs" not found Feb 12 19:18:18.255542 kubelet[2548]: E0212 19:18:18.255524 2548 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:18:18.255680 kubelet[2548]: E0212 19:18:18.255667 2548 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/f48b881f-38c3-45c6-a874-29c291ba13b6-calico-apiserver-certs podName:f48b881f-38c3-45c6-a874-29c291ba13b6 nodeName:}" failed. No retries permitted until 2024-02-12 19:18:19.255653418 +0000 UTC m=+58.305747439 (durationBeforeRetry 1s). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/f48b881f-38c3-45c6-a874-29c291ba13b6-calico-apiserver-certs") pod "calico-apiserver-7769dd965f-x4fvm" (UID: "f48b881f-38c3-45c6-a874-29c291ba13b6") : secret "calico-apiserver-certs" not found Feb 12 19:18:19.281500 env[1378]: time="2024-02-12T19:18:19.281109795Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7769dd965f-9ljgm,Uid:e09f5510-aa03-4ac2-8147-86c487f89537,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:18:19.437505 systemd-networkd[1532]: cali061b6062509: Link UP Feb 12 19:18:19.452998 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:18:19.453150 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali061b6062509: link becomes ready Feb 12 19:18:19.453575 systemd-networkd[1532]: cali061b6062509: Gained carrier Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.355 [INFO][4661] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0 calico-apiserver-7769dd965f- calico-apiserver e09f5510-aa03-4ac2-8147-86c487f89537 804 0 2024-02-12 19:18:17 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7769dd965f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-f1f3323662 calico-apiserver-7769dd965f-9ljgm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali061b6062509 [] []}} ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-9ljgm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.356 [INFO][4661] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-9ljgm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.398 [INFO][4672] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" HandleID="k8s-pod-network.95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.409 [INFO][4672] ipam_plugin.go 268: Auto assigning IP ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" HandleID="k8s-pod-network.95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027a7c0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-f1f3323662", "pod":"calico-apiserver-7769dd965f-9ljgm", "timestamp":"2024-02-12 19:18:19.398615258 +0000 UTC"}, Hostname:"ci-3510.3.2-a-f1f3323662", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.410 [INFO][4672] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.410 [INFO][4672] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.410 [INFO][4672] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-f1f3323662' Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.411 [INFO][4672] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.414 [INFO][4672] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.417 [INFO][4672] ipam.go 489: Trying affinity for 192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.418 [INFO][4672] ipam.go 155: Attempting to load block cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.423 [INFO][4672] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.424 [INFO][4672] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.425 [INFO][4672] ipam.go 1682: Creating new handle: k8s-pod-network.95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347 Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.428 [INFO][4672] ipam.go 1203: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.434 [INFO][4672] ipam.go 1216: Successfully claimed IPs: [192.168.106.133/26] block=192.168.106.128/26 handle="k8s-pod-network.95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.434 [INFO][4672] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.106.133/26] handle="k8s-pod-network.95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.434 [INFO][4672] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:19.466983 env[1378]: 2024-02-12 19:18:19.434 [INFO][4672] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.106.133/26] IPv6=[] ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" HandleID="k8s-pod-network.95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" Feb 12 19:18:19.467646 env[1378]: 2024-02-12 19:18:19.435 [INFO][4661] k8s.go 385: Populated endpoint ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-9ljgm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0", GenerateName:"calico-apiserver-7769dd965f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e09f5510-aa03-4ac2-8147-86c487f89537", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 18, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7769dd965f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"", Pod:"calico-apiserver-7769dd965f-9ljgm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.106.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali061b6062509", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:19.467646 env[1378]: 2024-02-12 19:18:19.435 [INFO][4661] k8s.go 386: Calico CNI using IPs: [192.168.106.133/32] ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-9ljgm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" Feb 12 19:18:19.467646 env[1378]: 2024-02-12 19:18:19.435 [INFO][4661] dataplane_linux.go 68: Setting the host side veth name to cali061b6062509 ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-9ljgm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" Feb 12 19:18:19.467646 env[1378]: 2024-02-12 19:18:19.455 [INFO][4661] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-9ljgm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" Feb 12 19:18:19.467646 env[1378]: 2024-02-12 19:18:19.455 [INFO][4661] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-9ljgm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0", GenerateName:"calico-apiserver-7769dd965f-", Namespace:"calico-apiserver", SelfLink:"", UID:"e09f5510-aa03-4ac2-8147-86c487f89537", ResourceVersion:"804", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 18, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7769dd965f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347", Pod:"calico-apiserver-7769dd965f-9ljgm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.106.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali061b6062509", MAC:"5a:44:2a:bc:f0:b1", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:19.467646 env[1378]: 2024-02-12 19:18:19.464 [INFO][4661] k8s.go 491: Wrote updated endpoint to datastore ContainerID="95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-9ljgm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--9ljgm-eth0" Feb 12 19:18:19.492834 env[1378]: time="2024-02-12T19:18:19.492750085Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:19.492834 env[1378]: time="2024-02-12T19:18:19.492792045Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:19.492834 env[1378]: time="2024-02-12T19:18:19.492809645Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:19.493220 env[1378]: time="2024-02-12T19:18:19.493179044Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347 pid=4703 runtime=io.containerd.runc.v2 Feb 12 19:18:19.511582 systemd[1]: Started cri-containerd-95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347.scope. Feb 12 19:18:19.529000 audit[4723]: NETFILTER_CFG table=filter:134 family=2 entries=55 op=nft_register_chain pid=4723 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:19.529000 audit[4723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28088 a0=3 a1=ffffe7f0f650 a2=0 a3=ffff8cfe3fa8 items=0 ppid=3709 pid=4723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.529000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.552000 audit: BPF prog-id=180 op=LOAD Feb 12 19:18:19.553000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.553000 audit[4712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4703 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935373833323536666165363435306438623738353063323332303635 Feb 12 19:18:19.553000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.553000 audit[4712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4703 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.553000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935373833323536666165363435306438623738353063323332303635 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit: BPF prog-id=181 op=LOAD Feb 12 19:18:19.554000 audit[4712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4703 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935373833323536666165363435306438623738353063323332303635 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.554000 audit: BPF prog-id=182 op=LOAD Feb 12 19:18:19.554000 audit[4712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4703 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.554000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935373833323536666165363435306438623738353063323332303635 Feb 12 19:18:19.555000 audit: BPF prog-id=182 op=UNLOAD Feb 12 19:18:19.555000 audit: BPF prog-id=181 op=UNLOAD Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { perfmon } for pid=4712 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit[4712]: AVC avc: denied { bpf } for pid=4712 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.555000 audit: BPF prog-id=183 op=LOAD Feb 12 19:18:19.555000 audit[4712]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4703 pid=4712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3935373833323536666165363435306438623738353063323332303635 Feb 12 19:18:19.562059 env[1378]: time="2024-02-12T19:18:19.562020117Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7769dd965f-x4fvm,Uid:f48b881f-38c3-45c6-a874-29c291ba13b6,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:18:19.578213 env[1378]: time="2024-02-12T19:18:19.578174807Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7769dd965f-9ljgm,Uid:e09f5510-aa03-4ac2-8147-86c487f89537,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347\"" Feb 12 19:18:19.579641 env[1378]: time="2024-02-12T19:18:19.579614164Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:18:19.710851 systemd-networkd[1532]: cali5869541141d: Link UP Feb 12 19:18:19.715799 systemd-networkd[1532]: cali5869541141d: Gained carrier Feb 12 19:18:19.716511 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5869541141d: link becomes ready Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.640 [INFO][4739] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0 calico-apiserver-7769dd965f- calico-apiserver f48b881f-38c3-45c6-a874-29c291ba13b6 799 0 2024-02-12 19:18:17 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7769dd965f projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-f1f3323662 calico-apiserver-7769dd965f-x4fvm eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali5869541141d [] []}} ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-x4fvm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.641 [INFO][4739] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-x4fvm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.666 [INFO][4752] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" HandleID="k8s-pod-network.ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.683 [INFO][4752] ipam_plugin.go 268: Auto assigning IP ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" HandleID="k8s-pod-network.ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400011a4b0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-f1f3323662", "pod":"calico-apiserver-7769dd965f-x4fvm", "timestamp":"2024-02-12 19:18:19.666322724 +0000 UTC"}, Hostname:"ci-3510.3.2-a-f1f3323662", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.683 [INFO][4752] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.683 [INFO][4752] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.683 [INFO][4752] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-f1f3323662' Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.684 [INFO][4752] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.687 [INFO][4752] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.691 [INFO][4752] ipam.go 489: Trying affinity for 192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.692 [INFO][4752] ipam.go 155: Attempting to load block cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.695 [INFO][4752] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.106.128/26 host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.695 [INFO][4752] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.106.128/26 handle="k8s-pod-network.ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.696 [INFO][4752] ipam.go 1682: Creating new handle: k8s-pod-network.ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14 Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.699 [INFO][4752] ipam.go 1203: Writing block in order to claim IPs block=192.168.106.128/26 handle="k8s-pod-network.ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.703 [INFO][4752] ipam.go 1216: Successfully claimed IPs: [192.168.106.134/26] block=192.168.106.128/26 handle="k8s-pod-network.ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.703 [INFO][4752] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.106.134/26] handle="k8s-pod-network.ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" host="ci-3510.3.2-a-f1f3323662" Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.703 [INFO][4752] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:19.735057 env[1378]: 2024-02-12 19:18:19.703 [INFO][4752] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.106.134/26] IPv6=[] ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" HandleID="k8s-pod-network.ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" Feb 12 19:18:19.735656 env[1378]: 2024-02-12 19:18:19.705 [INFO][4739] k8s.go 385: Populated endpoint ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-x4fvm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0", GenerateName:"calico-apiserver-7769dd965f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f48b881f-38c3-45c6-a874-29c291ba13b6", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 18, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7769dd965f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"", Pod:"calico-apiserver-7769dd965f-x4fvm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.106.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5869541141d", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:19.735656 env[1378]: 2024-02-12 19:18:19.705 [INFO][4739] k8s.go 386: Calico CNI using IPs: [192.168.106.134/32] ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-x4fvm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" Feb 12 19:18:19.735656 env[1378]: 2024-02-12 19:18:19.705 [INFO][4739] dataplane_linux.go 68: Setting the host side veth name to cali5869541141d ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-x4fvm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" Feb 12 19:18:19.735656 env[1378]: 2024-02-12 19:18:19.715 [INFO][4739] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-x4fvm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" Feb 12 19:18:19.735656 env[1378]: 2024-02-12 19:18:19.716 [INFO][4739] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-x4fvm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0", GenerateName:"calico-apiserver-7769dd965f-", Namespace:"calico-apiserver", SelfLink:"", UID:"f48b881f-38c3-45c6-a874-29c291ba13b6", ResourceVersion:"799", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 18, 17, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7769dd965f", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14", Pod:"calico-apiserver-7769dd965f-x4fvm", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.106.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali5869541141d", MAC:"ba:d6:a3:21:bb:ee", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:19.735656 env[1378]: 2024-02-12 19:18:19.731 [INFO][4739] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14" Namespace="calico-apiserver" Pod="calico-apiserver-7769dd965f-x4fvm" WorkloadEndpoint="ci--3510.3.2--a--f1f3323662-k8s-calico--apiserver--7769dd965f--x4fvm-eth0" Feb 12 19:18:19.755743 env[1378]: time="2024-02-12T19:18:19.755660760Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:19.755889 env[1378]: time="2024-02-12T19:18:19.755773319Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:19.755889 env[1378]: time="2024-02-12T19:18:19.755802119Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:19.755962 env[1378]: time="2024-02-12T19:18:19.755930079Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14 pid=4777 runtime=io.containerd.runc.v2 Feb 12 19:18:19.756000 audit[4779]: NETFILTER_CFG table=filter:135 family=2 entries=46 op=nft_register_chain pid=4779 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:19.756000 audit[4779]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23292 a0=3 a1=ffffd2394860 a2=0 a3=ffffbb4eafa8 items=0 ppid=3709 pid=4779 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.756000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:19.768096 systemd[1]: Started cri-containerd-ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14.scope. Feb 12 19:18:19.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.789000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.789000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit: BPF prog-id=184 op=LOAD Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4777 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333930326262306338656433366336616261643237373639373765 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4777 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333930326262306338656433366336616261643237373639373765 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.790000 audit: BPF prog-id=185 op=LOAD Feb 12 19:18:19.790000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4777 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.790000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333930326262306338656433366336616261643237373639373765 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit: BPF prog-id=186 op=LOAD Feb 12 19:18:19.791000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4777 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333930326262306338656433366336616261643237373639373765 Feb 12 19:18:19.791000 audit: BPF prog-id=186 op=UNLOAD Feb 12 19:18:19.791000 audit: BPF prog-id=185 op=UNLOAD Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { perfmon } for pid=4790 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit[4790]: AVC avc: denied { bpf } for pid=4790 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:19.791000 audit: BPF prog-id=187 op=LOAD Feb 12 19:18:19.791000 audit[4790]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4777 pid=4790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:19.791000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6365333930326262306338656433366336616261643237373639373765 Feb 12 19:18:19.819949 env[1378]: time="2024-02-12T19:18:19.819906641Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7769dd965f-x4fvm,Uid:f48b881f-38c3-45c6-a874-29c291ba13b6,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14\"" Feb 12 19:18:20.918572 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3949351503.mount: Deactivated successfully. Feb 12 19:18:21.051693 systemd-networkd[1532]: cali5869541141d: Gained IPv6LL Feb 12 19:18:21.051952 systemd-networkd[1532]: cali061b6062509: Gained IPv6LL Feb 12 19:18:21.101267 env[1378]: time="2024-02-12T19:18:21.101222213Z" level=info msg="StopPodSandbox for \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\"" Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.137 [WARNING][4825] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9f3b6520-f0dd-4025-8b27-732678b24b50", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350", Pod:"coredns-787d4945fb-bqggh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.106.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9e7b2cf2fc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.137 [INFO][4825] k8s.go 578: Cleaning up netns ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.138 [INFO][4825] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" iface="eth0" netns="" Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.138 [INFO][4825] k8s.go 585: Releasing IP address(es) ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.138 [INFO][4825] utils.go 188: Calico CNI releasing IP address ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.155 [INFO][4832] ipam_plugin.go 415: Releasing address using handleID ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" HandleID="k8s-pod-network.986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.155 [INFO][4832] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.155 [INFO][4832] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.166 [WARNING][4832] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" HandleID="k8s-pod-network.986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.166 [INFO][4832] ipam_plugin.go 443: Releasing address using workloadID ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" HandleID="k8s-pod-network.986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.169 [INFO][4832] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:21.187394 env[1378]: 2024-02-12 19:18:21.184 [INFO][4825] k8s.go 591: Teardown processing complete. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:21.188210 env[1378]: time="2024-02-12T19:18:21.188159295Z" level=info msg="TearDown network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\" successfully" Feb 12 19:18:21.188210 env[1378]: time="2024-02-12T19:18:21.188201175Z" level=info msg="StopPodSandbox for \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\" returns successfully" Feb 12 19:18:21.189330 env[1378]: time="2024-02-12T19:18:21.189298093Z" level=info msg="RemovePodSandbox for \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\"" Feb 12 19:18:21.189456 env[1378]: time="2024-02-12T19:18:21.189344133Z" level=info msg="Forcibly stopping sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\"" Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.285 [WARNING][4854] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"9f3b6520-f0dd-4025-8b27-732678b24b50", ResourceVersion:"734", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"6b1711f08959b0e8dabdfecf1b02a6fae87739e985dd5031c3d2af4e0697b350", Pod:"coredns-787d4945fb-bqggh", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.106.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calie9e7b2cf2fc", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.286 [INFO][4854] k8s.go 578: Cleaning up netns ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.286 [INFO][4854] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" iface="eth0" netns="" Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.286 [INFO][4854] k8s.go 585: Releasing IP address(es) ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.286 [INFO][4854] utils.go 188: Calico CNI releasing IP address ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.335 [INFO][4860] ipam_plugin.go 415: Releasing address using handleID ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" HandleID="k8s-pod-network.986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.335 [INFO][4860] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.335 [INFO][4860] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.347 [WARNING][4860] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" HandleID="k8s-pod-network.986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.347 [INFO][4860] ipam_plugin.go 443: Releasing address using workloadID ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" HandleID="k8s-pod-network.986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--bqggh-eth0" Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.348 [INFO][4860] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:21.351391 env[1378]: 2024-02-12 19:18:21.350 [INFO][4854] k8s.go 591: Teardown processing complete. ContainerID="986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc" Feb 12 19:18:21.352282 env[1378]: time="2024-02-12T19:18:21.352219277Z" level=info msg="TearDown network for sandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\" successfully" Feb 12 19:18:21.381806 env[1378]: time="2024-02-12T19:18:21.381763583Z" level=info msg="RemovePodSandbox \"986f3e2197d1b2aa79ffe28eb2cd06eba16f05dab74276a61b77f78623bd9dcc\" returns successfully" Feb 12 19:18:21.382730 env[1378]: time="2024-02-12T19:18:21.382636142Z" level=info msg="StopPodSandbox for \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\"" Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.431 [WARNING][4882] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"167d5c07-6115-4111-9a6f-d5cbc28dedbc", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677", Pod:"coredns-787d4945fb-8lgvg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.106.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib86209e193f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.432 [INFO][4882] k8s.go 578: Cleaning up netns ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.432 [INFO][4882] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" iface="eth0" netns="" Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.432 [INFO][4882] k8s.go 585: Releasing IP address(es) ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.432 [INFO][4882] utils.go 188: Calico CNI releasing IP address ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.458 [INFO][4889] ipam_plugin.go 415: Releasing address using handleID ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" HandleID="k8s-pod-network.9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.458 [INFO][4889] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.458 [INFO][4889] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.467 [WARNING][4889] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" HandleID="k8s-pod-network.9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.467 [INFO][4889] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" HandleID="k8s-pod-network.9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.468 [INFO][4889] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:21.471356 env[1378]: 2024-02-12 19:18:21.470 [INFO][4882] k8s.go 591: Teardown processing complete. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:21.472124 env[1378]: time="2024-02-12T19:18:21.472091139Z" level=info msg="TearDown network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\" successfully" Feb 12 19:18:21.472214 env[1378]: time="2024-02-12T19:18:21.472197179Z" level=info msg="StopPodSandbox for \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\" returns successfully" Feb 12 19:18:21.472994 env[1378]: time="2024-02-12T19:18:21.472966217Z" level=info msg="RemovePodSandbox for \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\"" Feb 12 19:18:21.473243 env[1378]: time="2024-02-12T19:18:21.473202097Z" level=info msg="Forcibly stopping sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\"" Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.533 [WARNING][4907] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0", GenerateName:"coredns-787d4945fb-", Namespace:"kube-system", SelfLink:"", UID:"167d5c07-6115-4111-9a6f-d5cbc28dedbc", ResourceVersion:"699", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"787d4945fb", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"5c9e8d408baff6b45e96f6a72a6b329fb248909657c3c3bd09bc6638d9b96677", Pod:"coredns-787d4945fb-8lgvg", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.106.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib86209e193f", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.533 [INFO][4907] k8s.go 578: Cleaning up netns ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.533 [INFO][4907] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" iface="eth0" netns="" Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.533 [INFO][4907] k8s.go 585: Releasing IP address(es) ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.533 [INFO][4907] utils.go 188: Calico CNI releasing IP address ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.555 [INFO][4913] ipam_plugin.go 415: Releasing address using handleID ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" HandleID="k8s-pod-network.9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.556 [INFO][4913] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.556 [INFO][4913] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.566 [WARNING][4913] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" HandleID="k8s-pod-network.9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.567 [INFO][4913] ipam_plugin.go 443: Releasing address using workloadID ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" HandleID="k8s-pod-network.9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Workload="ci--3510.3.2--a--f1f3323662-k8s-coredns--787d4945fb--8lgvg-eth0" Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.572 [INFO][4913] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:21.576255 env[1378]: 2024-02-12 19:18:21.574 [INFO][4907] k8s.go 591: Teardown processing complete. ContainerID="9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09" Feb 12 19:18:21.576864 env[1378]: time="2024-02-12T19:18:21.576831669Z" level=info msg="TearDown network for sandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\" successfully" Feb 12 19:18:21.585599 env[1378]: time="2024-02-12T19:18:21.585557093Z" level=info msg="RemovePodSandbox \"9e8149a28fab248fec514f24fbee08cea146bf359983dfb49455bf5554653b09\" returns successfully" Feb 12 19:18:21.586363 env[1378]: time="2024-02-12T19:18:21.586338051Z" level=info msg="StopPodSandbox for \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\"" Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.635 [WARNING][4931] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f43d848e-34cb-4479-97c9-1f49a005d06d", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5", Pod:"csi-node-driver-tgqqb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.106.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie7cfae7345c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.636 [INFO][4931] k8s.go 578: Cleaning up netns ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.636 [INFO][4931] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" iface="eth0" netns="" Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.636 [INFO][4931] k8s.go 585: Releasing IP address(es) ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.636 [INFO][4931] utils.go 188: Calico CNI releasing IP address ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.665 [INFO][4937] ipam_plugin.go 415: Releasing address using handleID ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" HandleID="k8s-pod-network.63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.665 [INFO][4937] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.666 [INFO][4937] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.676 [WARNING][4937] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" HandleID="k8s-pod-network.63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.676 [INFO][4937] ipam_plugin.go 443: Releasing address using workloadID ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" HandleID="k8s-pod-network.63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.679 [INFO][4937] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:21.682535 env[1378]: 2024-02-12 19:18:21.681 [INFO][4931] k8s.go 591: Teardown processing complete. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:21.683210 env[1378]: time="2024-02-12T19:18:21.683145715Z" level=info msg="TearDown network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\" successfully" Feb 12 19:18:21.683291 env[1378]: time="2024-02-12T19:18:21.683275075Z" level=info msg="StopPodSandbox for \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\" returns successfully" Feb 12 19:18:21.684113 env[1378]: time="2024-02-12T19:18:21.684088634Z" level=info msg="RemovePodSandbox for \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\"" Feb 12 19:18:21.684362 env[1378]: time="2024-02-12T19:18:21.684318073Z" level=info msg="Forcibly stopping sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\"" Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.717 [WARNING][4958] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"f43d848e-34cb-4479-97c9-1f49a005d06d", ResourceVersion:"765", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"7c77f88967", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"d1191e74210391f8460053b5f3bd5d6803b67ce8ba66cd10eba8d5e162f74ce5", Pod:"csi-node-driver-tgqqb", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.106.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calie7cfae7345c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.717 [INFO][4958] k8s.go 578: Cleaning up netns ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.717 [INFO][4958] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" iface="eth0" netns="" Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.717 [INFO][4958] k8s.go 585: Releasing IP address(es) ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.717 [INFO][4958] utils.go 188: Calico CNI releasing IP address ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.740 [INFO][4964] ipam_plugin.go 415: Releasing address using handleID ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" HandleID="k8s-pod-network.63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.740 [INFO][4964] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.740 [INFO][4964] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.749 [WARNING][4964] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" HandleID="k8s-pod-network.63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.749 [INFO][4964] ipam_plugin.go 443: Releasing address using workloadID ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" HandleID="k8s-pod-network.63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Workload="ci--3510.3.2--a--f1f3323662-k8s-csi--node--driver--tgqqb-eth0" Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.750 [INFO][4964] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:21.752957 env[1378]: 2024-02-12 19:18:21.751 [INFO][4958] k8s.go 591: Teardown processing complete. ContainerID="63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66" Feb 12 19:18:21.753524 env[1378]: time="2024-02-12T19:18:21.753489147Z" level=info msg="TearDown network for sandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\" successfully" Feb 12 19:18:21.873668 env[1378]: time="2024-02-12T19:18:21.873620569Z" level=info msg="RemovePodSandbox \"63082a475540980fd6d2ff1013555f8c7df1f4e605b32867449bea9b07122a66\" returns successfully" Feb 12 19:18:21.874055 env[1378]: time="2024-02-12T19:18:21.874019688Z" level=info msg="StopPodSandbox for \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\"" Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.927 [WARNING][4983] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0", GenerateName:"calico-kube-controllers-77b7ff686c-", Namespace:"calico-system", SelfLink:"", UID:"2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73", ResourceVersion:"749", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77b7ff686c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41", Pod:"calico-kube-controllers-77b7ff686c-vh2cp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.106.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6b81222ebfe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.927 [INFO][4983] k8s.go 578: Cleaning up netns ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.927 [INFO][4983] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" iface="eth0" netns="" Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.928 [INFO][4983] k8s.go 585: Releasing IP address(es) ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.928 [INFO][4983] utils.go 188: Calico CNI releasing IP address ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.959 [INFO][4989] ipam_plugin.go 415: Releasing address using handleID ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" HandleID="k8s-pod-network.838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.959 [INFO][4989] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.959 [INFO][4989] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.968 [WARNING][4989] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" HandleID="k8s-pod-network.838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.968 [INFO][4989] ipam_plugin.go 443: Releasing address using workloadID ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" HandleID="k8s-pod-network.838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.969 [INFO][4989] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:21.971952 env[1378]: 2024-02-12 19:18:21.970 [INFO][4983] k8s.go 591: Teardown processing complete. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:21.972492 env[1378]: time="2024-02-12T19:18:21.972004350Z" level=info msg="TearDown network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\" successfully" Feb 12 19:18:21.972824 env[1378]: time="2024-02-12T19:18:21.972038030Z" level=info msg="StopPodSandbox for \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\" returns successfully" Feb 12 19:18:21.973731 env[1378]: time="2024-02-12T19:18:21.973698867Z" level=info msg="RemovePodSandbox for \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\"" Feb 12 19:18:21.973877 env[1378]: time="2024-02-12T19:18:21.973837307Z" level=info msg="Forcibly stopping sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\"" Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.026 [WARNING][5009] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0", GenerateName:"calico-kube-controllers-77b7ff686c-", Namespace:"calico-system", SelfLink:"", UID:"2602b6b4-46c5-4c52-ad27-5e5ac9d0fb73", ResourceVersion:"749", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 44, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"77b7ff686c", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-f1f3323662", ContainerID:"2759019d7a7124c5fa1f59f28a001189ac6242fe62b0e3de101ec7a5c0bacd41", Pod:"calico-kube-controllers-77b7ff686c-vh2cp", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.106.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali6b81222ebfe", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.026 [INFO][5009] k8s.go 578: Cleaning up netns ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.026 [INFO][5009] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" iface="eth0" netns="" Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.027 [INFO][5009] k8s.go 585: Releasing IP address(es) ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.027 [INFO][5009] utils.go 188: Calico CNI releasing IP address ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.076 [INFO][5015] ipam_plugin.go 415: Releasing address using handleID ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" HandleID="k8s-pod-network.838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.077 [INFO][5015] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.077 [INFO][5015] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.090 [WARNING][5015] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" HandleID="k8s-pod-network.838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.090 [INFO][5015] ipam_plugin.go 443: Releasing address using workloadID ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" HandleID="k8s-pod-network.838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Workload="ci--3510.3.2--a--f1f3323662-k8s-calico--kube--controllers--77b7ff686c--vh2cp-eth0" Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.091 [INFO][5015] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:22.093811 env[1378]: 2024-02-12 19:18:22.092 [INFO][5009] k8s.go 591: Teardown processing complete. ContainerID="838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748" Feb 12 19:18:22.094970 env[1378]: time="2024-02-12T19:18:22.093789090Z" level=info msg="TearDown network for sandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\" successfully" Feb 12 19:18:22.103626 env[1378]: time="2024-02-12T19:18:22.103575472Z" level=info msg="RemovePodSandbox \"838cdf0cf89afcf80d3cc8e3936e999d9326e1419fc13b430f30534e6d81a748\" returns successfully" Feb 12 19:18:22.667924 env[1378]: time="2024-02-12T19:18:22.667865734Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:22.683197 env[1378]: time="2024-02-12T19:18:22.683147586Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:22.688271 env[1378]: time="2024-02-12T19:18:22.688232337Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:22.693611 env[1378]: time="2024-02-12T19:18:22.693551127Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:22.694351 env[1378]: time="2024-02-12T19:18:22.694320846Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 19:18:22.696846 env[1378]: time="2024-02-12T19:18:22.696108443Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:18:22.697547 env[1378]: time="2024-02-12T19:18:22.697509320Z" level=info msg="CreateContainer within sandbox \"95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:18:22.780901 env[1378]: time="2024-02-12T19:18:22.780848930Z" level=info msg="CreateContainer within sandbox \"95783256fae6450d8b7850c232065e00036a312b680b29ae2a58c727853e2347\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6069826b2f54ee5b1808551c0493c655d1cdc0efbad7a6b9e275421b3c424f3c\"" Feb 12 19:18:22.781619 env[1378]: time="2024-02-12T19:18:22.781582408Z" level=info msg="StartContainer for \"6069826b2f54ee5b1808551c0493c655d1cdc0efbad7a6b9e275421b3c424f3c\"" Feb 12 19:18:22.810229 systemd[1]: Started cri-containerd-6069826b2f54ee5b1808551c0493c655d1cdc0efbad7a6b9e275421b3c424f3c.scope. Feb 12 19:18:22.823000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.830640 kernel: kauditd_printk_skb: 189 callbacks suppressed Feb 12 19:18:22.830753 kernel: audit: type=1400 audit(1707765502.823:1380): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870542 kernel: audit: type=1400 audit(1707765502.833:1381): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.891766 kernel: audit: type=1400 audit(1707765502.833:1382): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.932177 kernel: audit: type=1400 audit(1707765502.833:1383): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.932276 kernel: audit: type=1400 audit(1707765502.833:1384): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.933437 kernel: audit: type=1400 audit(1707765502.833:1385): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.975915 kernel: audit: type=1400 audit(1707765502.833:1386): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.833000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.997458 kernel: audit: type=1400 audit(1707765502.833:1387): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.833000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.018273 kernel: audit: type=1400 audit(1707765502.833:1388): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.848000 audit: BPF prog-id=188 op=LOAD Feb 12 19:18:23.041217 kernel: audit: type=1400 audit(1707765502.848:1389): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=4703 pid=5028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363938323662326635346565356231383038353531633034393363 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=4703 pid=5028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363938323662326635346565356231383038353531633034393363 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit: BPF prog-id=189 op=LOAD Feb 12 19:18:22.870000 audit[5028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=4703 pid=5028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363938323662326635346565356231383038353531633034393363 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit: BPF prog-id=190 op=LOAD Feb 12 19:18:22.870000 audit[5028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=4703 pid=5028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363938323662326635346565356231383038353531633034393363 Feb 12 19:18:22.870000 audit: BPF prog-id=190 op=UNLOAD Feb 12 19:18:22.870000 audit: BPF prog-id=189 op=UNLOAD Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { perfmon } for pid=5028 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit[5028]: AVC avc: denied { bpf } for pid=5028 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:22.870000 audit: BPF prog-id=191 op=LOAD Feb 12 19:18:22.870000 audit[5028]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=4703 pid=5028 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.870000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363938323662326635346565356231383038353531633034393363 Feb 12 19:18:23.042767 env[1378]: time="2024-02-12T19:18:23.042728417Z" level=info msg="StartContainer for \"6069826b2f54ee5b1808551c0493c655d1cdc0efbad7a6b9e275421b3c424f3c\" returns successfully" Feb 12 19:18:23.155169 env[1378]: time="2024-02-12T19:18:23.155108896Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:23.161257 env[1378]: time="2024-02-12T19:18:23.161208885Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:23.166426 env[1378]: time="2024-02-12T19:18:23.166377116Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:23.169862 env[1378]: time="2024-02-12T19:18:23.169814550Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:23.170486 env[1378]: time="2024-02-12T19:18:23.170457549Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 19:18:23.172546 env[1378]: time="2024-02-12T19:18:23.172508145Z" level=info msg="CreateContainer within sandbox \"ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:18:23.209263 env[1378]: time="2024-02-12T19:18:23.209221199Z" level=info msg="CreateContainer within sandbox \"ce3902bb0c8ed36c6abad2776977ebe056280a655f4040e183bdb9d045ff9e14\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"6a347f43c4b7794d775d4c6d7a11bdf62b34a76ab1ac4af3ad67770d74d3060a\"" Feb 12 19:18:23.210067 env[1378]: time="2024-02-12T19:18:23.210040878Z" level=info msg="StartContainer for \"6a347f43c4b7794d775d4c6d7a11bdf62b34a76ab1ac4af3ad67770d74d3060a\"" Feb 12 19:18:23.229327 systemd[1]: Started cri-containerd-6a347f43c4b7794d775d4c6d7a11bdf62b34a76ab1ac4af3ad67770d74d3060a.scope. Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit: BPF prog-id=192 op=LOAD Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4777 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333437663433633462373739346437373564346336643761313162 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4777 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333437663433633462373739346437373564346336643761313162 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit: BPF prog-id=193 op=LOAD Feb 12 19:18:23.249000 audit[5064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4777 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333437663433633462373739346437373564346336643761313162 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit: BPF prog-id=194 op=LOAD Feb 12 19:18:23.249000 audit[5064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4777 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333437663433633462373739346437373564346336643761313162 Feb 12 19:18:23.249000 audit: BPF prog-id=194 op=UNLOAD Feb 12 19:18:23.249000 audit: BPF prog-id=193 op=UNLOAD Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { perfmon } for pid=5064 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit[5064]: AVC avc: denied { bpf } for pid=5064 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.249000 audit: BPF prog-id=195 op=LOAD Feb 12 19:18:23.249000 audit[5064]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4777 pid=5064 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.249000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661333437663433633462373739346437373564346336643761313162 Feb 12 19:18:23.279442 env[1378]: time="2024-02-12T19:18:23.279373713Z" level=info msg="StartContainer for \"6a347f43c4b7794d775d4c6d7a11bdf62b34a76ab1ac4af3ad67770d74d3060a\" returns successfully" Feb 12 19:18:23.460185 kubelet[2548]: I0212 19:18:23.460074 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7769dd965f-x4fvm" podStartSLOduration=-9.223372030394753e+09 pod.CreationTimestamp="2024-02-12 19:18:17 +0000 UTC" firstStartedPulling="2024-02-12 19:18:19.821091879 +0000 UTC m=+58.871185860" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:18:23.435505953 +0000 UTC m=+62.485599974" watchObservedRunningTime="2024-02-12 19:18:23.460024229 +0000 UTC m=+62.510118250" Feb 12 19:18:23.460185 kubelet[2548]: I0212 19:18:23.460159 2548 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7769dd965f-9ljgm" podStartSLOduration=-9.223372030394634e+09 pod.CreationTimestamp="2024-02-12 19:18:17 +0000 UTC" firstStartedPulling="2024-02-12 19:18:19.579342725 +0000 UTC m=+58.629436746" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:18:23.45973735 +0000 UTC m=+62.509831371" watchObservedRunningTime="2024-02-12 19:18:23.460142469 +0000 UTC m=+62.510236490" Feb 12 19:18:23.616000 audit[5118]: NETFILTER_CFG table=filter:136 family=2 entries=8 op=nft_register_rule pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:23.616000 audit[5118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=ffffde067dc0 a2=0 a3=ffffbe42a6c0 items=0 ppid=2707 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.616000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:23.618000 audit[5118]: NETFILTER_CFG table=nat:137 family=2 entries=78 op=nft_register_rule pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:23.618000 audit[5118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=ffffde067dc0 a2=0 a3=ffffbe42a6c0 items=0 ppid=2707 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.618000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:23.767993 systemd[1]: run-containerd-runc-k8s.io-6069826b2f54ee5b1808551c0493c655d1cdc0efbad7a6b9e275421b3c424f3c-runc.LMG3Nk.mount: Deactivated successfully. Feb 12 19:18:23.783000 audit[5144]: NETFILTER_CFG table=filter:138 family=2 entries=8 op=nft_register_rule pid=5144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:23.783000 audit[5144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2620 a0=3 a1=fffffc678910 a2=0 a3=ffffb998c6c0 items=0 ppid=2707 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.783000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:23.785000 audit[5144]: NETFILTER_CFG table=nat:139 family=2 entries=78 op=nft_register_rule pid=5144 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:23.785000 audit[5144]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=24988 a0=3 a1=fffffc678910 a2=0 a3=ffffb998c6c0 items=0 ppid=2707 pid=5144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.785000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:24.148000 audit[5039]: AVC avc: denied { watch } for pid=5039 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.1922864177/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c738 tclass=file permissive=0 Feb 12 19:18:24.148000 audit[5039]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400093cac0 a2=fc6 a3=0 items=0 ppid=4703 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 key=(null) Feb 12 19:18:24.148000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:18:24.843000 audit[5075]: AVC avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.3202131218/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c263,c358 tclass=file permissive=0 Feb 12 19:18:24.843000 audit[5075]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a7a2e0 a2=fc6 a3=0 items=0 ppid=4777 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 key=(null) Feb 12 19:18:24.843000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:18:31.852000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:31.859739 kernel: kauditd_printk_skb: 122 callbacks suppressed Feb 12 19:18:31.859818 kernel: audit: type=1400 audit(1707765511.852:1422): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:31.852000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002336c60 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:18:31.917772 kernel: audit: type=1300 audit(1707765511.852:1422): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002336c60 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:18:31.852000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:31.944015 kernel: audit: type=1327 audit(1707765511.852:1422): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:31.944136 kernel: audit: type=1400 audit(1707765511.853:1423): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:31.853000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:31.853000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002336c80 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:18:31.999745 kernel: audit: type=1300 audit(1707765511.853:1423): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002336c80 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:18:31.853000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:32.027131 kernel: audit: type=1327 audit(1707765511.853:1423): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:32.027259 kernel: audit: type=1400 audit(1707765511.853:1424): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:31.853000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:31.853000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002336ca0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:18:32.082561 kernel: audit: type=1300 audit(1707765511.853:1424): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002336ca0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:18:31.853000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:32.109616 kernel: audit: type=1327 audit(1707765511.853:1424): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:32.109718 kernel: audit: type=1400 audit(1707765511.880:1425): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:31.880000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:31.880000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002336fc0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:18:31.880000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:41.889571 systemd[1]: run-containerd-runc-k8s.io-7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235-runc.nZrzio.mount: Deactivated successfully. Feb 12 19:18:42.883713 systemd[1]: run-containerd-runc-k8s.io-bac2b16736a67b2f41f6cf75bbe4d54dc09bb24841f96a18a5d18102dcdf3013-runc.trAAHi.mount: Deactivated successfully. Feb 12 19:18:49.383923 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:18:49.384087 kernel: audit: type=1325 audit(1707765529.376:1426): table=filter:140 family=2 entries=7 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:49.376000 audit[5276]: NETFILTER_CFG table=filter:140 family=2 entries=7 op=nft_register_rule pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:49.376000 audit[5276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffffb047440 a2=0 a3=ffff8ac496c0 items=0 ppid=2707 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:49.435535 kernel: audit: type=1300 audit(1707765529.376:1426): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffffb047440 a2=0 a3=ffff8ac496c0 items=0 ppid=2707 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:49.376000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:49.452531 kernel: audit: type=1327 audit(1707765529.376:1426): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:49.452667 kernel: audit: type=1325 audit(1707765529.382:1427): table=nat:141 family=2 entries=85 op=nft_register_chain pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:49.382000 audit[5276]: NETFILTER_CFG table=nat:141 family=2 entries=85 op=nft_register_chain pid=5276 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:49.382000 audit[5276]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28484 a0=3 a1=fffffb047440 a2=0 a3=ffff8ac496c0 items=0 ppid=2707 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:49.506099 kernel: audit: type=1300 audit(1707765529.382:1427): arch=c00000b7 syscall=211 success=yes exit=28484 a0=3 a1=fffffb047440 a2=0 a3=ffff8ac496c0 items=0 ppid=2707 pid=5276 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:49.507512 kernel: audit: type=1327 audit(1707765529.382:1427): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:49.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:49.583207 systemd[1]: run-containerd-runc-k8s.io-6a347f43c4b7794d775d4c6d7a11bdf62b34a76ab1ac4af3ad67770d74d3060a-runc.6Nhrsg.mount: Deactivated successfully. Feb 12 19:18:49.655000 audit[5324]: NETFILTER_CFG table=filter:142 family=2 entries=6 op=nft_register_rule pid=5324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:49.655000 audit[5324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff69a8670 a2=0 a3=ffff94b5c6c0 items=0 ppid=2707 pid=5324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:49.709559 kernel: audit: type=1325 audit(1707765529.655:1428): table=filter:142 family=2 entries=6 op=nft_register_rule pid=5324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:49.709689 kernel: audit: type=1300 audit(1707765529.655:1428): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=fffff69a8670 a2=0 a3=ffff94b5c6c0 items=0 ppid=2707 pid=5324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:49.655000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:49.726859 kernel: audit: type=1327 audit(1707765529.655:1428): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:49.658000 audit[5324]: NETFILTER_CFG table=nat:143 family=2 entries=92 op=nft_register_chain pid=5324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:49.747941 kernel: audit: type=1325 audit(1707765529.658:1429): table=nat:143 family=2 entries=92 op=nft_register_chain pid=5324 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:49.658000 audit[5324]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=fffff69a8670 a2=0 a3=ffff94b5c6c0 items=0 ppid=2707 pid=5324 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:49.658000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:19:17.196000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.204028 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:19:17.204149 kernel: audit: type=1400 audit(1707765557.196:1430): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.197000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.258451 kernel: audit: type=1400 audit(1707765557.197:1431): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.197000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4000d79c80 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:17.293449 kernel: audit: type=1300 audit(1707765557.197:1431): arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4000d79c80 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:17.197000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:17.321983 kernel: audit: type=1327 audit(1707765557.197:1431): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:17.322100 kernel: audit: type=1300 audit(1707765557.196:1430): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d8c3a0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:17.196000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d8c3a0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:17.196000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:17.385875 kernel: audit: type=1327 audit(1707765557.196:1430): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:17.763000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.763000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400a036de0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:19:17.824040 kernel: audit: type=1400 audit(1707765557.763:1432): avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.824170 kernel: audit: type=1300 audit(1707765557.763:1432): arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400a036de0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:19:17.763000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:17.853985 kernel: audit: type=1327 audit(1707765557.763:1432): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:17.764000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.886186 kernel: audit: type=1400 audit(1707765557.764:1433): avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.764000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400a036e40 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:19:17.764000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:17.764000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.764000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400a036e70 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:19:17.764000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:17.765000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.765000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=400fc0ce80 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:19:17.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:17.852000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.852000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=40019fece0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:19:17.852000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:17.853000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:17.853000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=73 a1=400a0370b0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:19:17.853000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:24.150000 audit[5039]: AVC avc: denied { watch } for pid=5039 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.1922864177/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c738 tclass=file permissive=0 Feb 12 19:19:24.157323 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 19:19:24.157478 kernel: audit: type=1400 audit(1707765564.150:1438): avc: denied { watch } for pid=5039 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.1922864177/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c738 tclass=file permissive=0 Feb 12 19:19:24.150000 audit[5039]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40018c4b60 a2=fc6 a3=0 items=0 ppid=4703 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 key=(null) Feb 12 19:19:24.219928 kernel: audit: type=1300 audit(1707765564.150:1438): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40018c4b60 a2=fc6 a3=0 items=0 ppid=4703 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 key=(null) Feb 12 19:19:24.150000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:19:24.255186 kernel: audit: type=1327 audit(1707765564.150:1438): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:19:24.844000 audit[5075]: AVC avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.3202131218/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c263,c358 tclass=file permissive=0 Feb 12 19:19:24.844000 audit[5075]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40015f5700 a2=fc6 a3=0 items=0 ppid=4777 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 key=(null) Feb 12 19:19:24.907987 kernel: audit: type=1400 audit(1707765564.844:1439): avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.3202131218/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c263,c358 tclass=file permissive=0 Feb 12 19:19:24.908120 kernel: audit: type=1300 audit(1707765564.844:1439): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40015f5700 a2=fc6 a3=0 items=0 ppid=4777 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 key=(null) Feb 12 19:19:24.844000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:19:24.940448 kernel: audit: type=1327 audit(1707765564.844:1439): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:19:31.854000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:31.854000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000cac900 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:31.919037 kernel: audit: type=1400 audit(1707765571.854:1440): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:31.919189 kernel: audit: type=1300 audit(1707765571.854:1440): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000cac900 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:31.854000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:31.947942 kernel: audit: type=1327 audit(1707765571.854:1440): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:31.948072 kernel: audit: type=1400 audit(1707765571.865:1441): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:31.865000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:31.865000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d8dda0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:32.009676 kernel: audit: type=1300 audit(1707765571.865:1441): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d8dda0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:31.865000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:32.041603 kernel: audit: type=1327 audit(1707765571.865:1441): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:32.041752 kernel: audit: type=1400 audit(1707765571.865:1442): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:31.865000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:31.865000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d8ddc0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:32.104420 kernel: audit: type=1300 audit(1707765571.865:1442): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000d8ddc0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:32.104552 kernel: audit: type=1327 audit(1707765571.865:1442): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:31.865000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:31.883000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:32.160006 kernel: audit: type=1400 audit(1707765571.883:1443): avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:31.883000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=400106f620 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:19:31.883000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:49.300179 systemd[1]: run-containerd-runc-k8s.io-6069826b2f54ee5b1808551c0493c655d1cdc0efbad7a6b9e275421b3c424f3c-runc.ukHx5C.mount: Deactivated successfully. Feb 12 19:19:49.577098 systemd[1]: run-containerd-runc-k8s.io-6a347f43c4b7794d775d4c6d7a11bdf62b34a76ab1ac4af3ad67770d74d3060a-runc.r1jmRj.mount: Deactivated successfully. Feb 12 19:19:56.193664 systemd[1]: run-containerd-runc-k8s.io-7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235-runc.mUiHoa.mount: Deactivated successfully. Feb 12 19:20:02.173000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.36:22-10.200.12.6:45974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:02.174514 systemd[1]: Started sshd@7-10.200.20.36:22-10.200.12.6:45974.service. Feb 12 19:20:02.180380 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:20:02.180506 kernel: audit: type=1130 audit(1707765602.173:1444): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.36:22-10.200.12.6:45974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:02.606000 audit[5566]: USER_ACCT pid=5566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.608474 sshd[5566]: Accepted publickey for core from 10.200.12.6 port 45974 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:02.636525 kernel: audit: type=1101 audit(1707765602.606:1445): pid=5566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.635000 audit[5566]: CRED_ACQ pid=5566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.636841 sshd[5566]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:02.678123 kernel: audit: type=1103 audit(1707765602.635:1446): pid=5566 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.678249 kernel: audit: type=1006 audit(1707765602.635:1447): pid=5566 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:20:02.635000 audit[5566]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff28d4590 a2=3 a3=1 items=0 ppid=1 pid=5566 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:02.704919 kernel: audit: type=1300 audit(1707765602.635:1447): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff28d4590 a2=3 a3=1 items=0 ppid=1 pid=5566 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:02.635000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:02.713975 kernel: audit: type=1327 audit(1707765602.635:1447): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:02.716548 systemd[1]: Started session-10.scope. Feb 12 19:20:02.716706 systemd-logind[1369]: New session 10 of user core. Feb 12 19:20:02.719000 audit[5566]: USER_START pid=5566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.722000 audit[5568]: CRED_ACQ pid=5568 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.774445 kernel: audit: type=1105 audit(1707765602.719:1448): pid=5566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:02.774555 kernel: audit: type=1103 audit(1707765602.722:1449): pid=5568 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:03.095624 sshd[5566]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:03.095000 audit[5566]: USER_END pid=5566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:03.098958 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:20:03.099701 systemd[1]: sshd@7-10.200.20.36:22-10.200.12.6:45974.service: Deactivated successfully. Feb 12 19:20:03.095000 audit[5566]: CRED_DISP pid=5566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:03.151243 kernel: audit: type=1106 audit(1707765603.095:1450): pid=5566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:03.151361 kernel: audit: type=1104 audit(1707765603.095:1451): pid=5566 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:03.095000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.36:22-10.200.12.6:45974 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:03.151600 systemd-logind[1369]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:20:03.152370 systemd-logind[1369]: Removed session 10. Feb 12 19:20:08.163000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.36:22-10.200.12.6:59830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:08.164482 systemd[1]: Started sshd@8-10.200.20.36:22-10.200.12.6:59830.service. Feb 12 19:20:08.170513 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:20:08.170624 kernel: audit: type=1130 audit(1707765608.163:1453): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.36:22-10.200.12.6:59830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:08.562000 audit[5582]: USER_ACCT pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:08.564321 sshd[5582]: Accepted publickey for core from 10.200.12.6 port 59830 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:08.590441 kernel: audit: type=1101 audit(1707765608.562:1454): pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:08.591911 sshd[5582]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:08.590000 audit[5582]: CRED_ACQ pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:08.633612 kernel: audit: type=1103 audit(1707765608.590:1455): pid=5582 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:08.633751 kernel: audit: type=1006 audit(1707765608.590:1456): pid=5582 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 19:20:08.590000 audit[5582]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2c1e400 a2=3 a3=1 items=0 ppid=1 pid=5582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:08.639143 systemd[1]: Started session-11.scope. Feb 12 19:20:08.660648 kernel: audit: type=1300 audit(1707765608.590:1456): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd2c1e400 a2=3 a3=1 items=0 ppid=1 pid=5582 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:08.661075 systemd-logind[1369]: New session 11 of user core. Feb 12 19:20:08.590000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:08.672516 kernel: audit: type=1327 audit(1707765608.590:1456): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:08.673000 audit[5582]: USER_START pid=5582 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:08.704431 kernel: audit: type=1105 audit(1707765608.673:1457): pid=5582 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:08.703000 audit[5584]: CRED_ACQ pid=5584 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:08.729432 kernel: audit: type=1103 audit(1707765608.703:1458): pid=5584 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:08.998965 sshd[5582]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:08.998000 audit[5582]: USER_END pid=5582 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:09.004000 audit[5582]: CRED_DISP pid=5582 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:09.029845 systemd[1]: sshd@8-10.200.20.36:22-10.200.12.6:59830.service: Deactivated successfully. Feb 12 19:20:09.030683 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:20:09.032017 systemd-logind[1369]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:20:09.032884 systemd-logind[1369]: Removed session 11. Feb 12 19:20:09.052580 kernel: audit: type=1106 audit(1707765608.998:1459): pid=5582 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:09.052691 kernel: audit: type=1104 audit(1707765609.004:1460): pid=5582 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:09.028000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.36:22-10.200.12.6:59830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:12.559932 systemd[1]: run-containerd-runc-k8s.io-bac2b16736a67b2f41f6cf75bbe4d54dc09bb24841f96a18a5d18102dcdf3013-runc.eO0YI1.mount: Deactivated successfully. Feb 12 19:20:14.066000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.36:22-10.200.12.6:59838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:14.067267 systemd[1]: Started sshd@9-10.200.20.36:22-10.200.12.6:59838.service. Feb 12 19:20:14.073301 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:20:14.073402 kernel: audit: type=1130 audit(1707765614.066:1462): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.36:22-10.200.12.6:59838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:14.468000 audit[5618]: USER_ACCT pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.469851 sshd[5618]: Accepted publickey for core from 10.200.12.6 port 59838 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:14.497474 kernel: audit: type=1101 audit(1707765614.468:1463): pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.496000 audit[5618]: CRED_ACQ pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.498832 sshd[5618]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:14.538446 kernel: audit: type=1103 audit(1707765614.496:1464): pid=5618 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.538559 kernel: audit: type=1006 audit(1707765614.497:1465): pid=5618 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 19:20:14.497000 audit[5618]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc070fa0 a2=3 a3=1 items=0 ppid=1 pid=5618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.543799 systemd-logind[1369]: New session 12 of user core. Feb 12 19:20:14.544366 systemd[1]: Started session-12.scope. Feb 12 19:20:14.565277 kernel: audit: type=1300 audit(1707765614.497:1465): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc070fa0 a2=3 a3=1 items=0 ppid=1 pid=5618 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:14.497000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:14.574875 kernel: audit: type=1327 audit(1707765614.497:1465): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:14.564000 audit[5618]: USER_START pid=5618 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.603296 kernel: audit: type=1105 audit(1707765614.564:1466): pid=5618 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.603589 kernel: audit: type=1103 audit(1707765614.567:1467): pid=5620 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.567000 audit[5620]: CRED_ACQ pid=5620 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.864631 sshd[5618]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:14.864000 audit[5618]: USER_END pid=5618 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.864000 audit[5618]: CRED_DISP pid=5618 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.897155 systemd[1]: sshd@9-10.200.20.36:22-10.200.12.6:59838.service: Deactivated successfully. Feb 12 19:20:14.898119 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:20:14.899434 systemd-logind[1369]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:20:14.900327 systemd-logind[1369]: Removed session 12. Feb 12 19:20:14.922157 kernel: audit: type=1106 audit(1707765614.864:1468): pid=5618 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.922321 kernel: audit: type=1104 audit(1707765614.864:1469): pid=5618 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:14.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.36:22-10.200.12.6:59838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:17.197000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:17.197000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40026eed20 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:20:17.197000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:17.197000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:17.197000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40029d42e0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:20:17.197000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:17.764000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:17.764000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=400f7edec0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:20:17.764000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:17.765000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:17.765000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:17.765000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=65 a1=40144e6d50 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:20:17.765000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=400f7edef0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:20:17.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:17.765000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:17.765000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=4002a24ea0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:20:17.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:17.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:17.853000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:17.853000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:17.853000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4014dc20f0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:20:17.853000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:17.853000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=67 a1=4000bbb3a0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:20:17.853000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:19.299855 systemd[1]: run-containerd-runc-k8s.io-6069826b2f54ee5b1808551c0493c655d1cdc0efbad7a6b9e275421b3c424f3c-runc.TDX2Ve.mount: Deactivated successfully. Feb 12 19:20:19.580314 systemd[1]: run-containerd-runc-k8s.io-6a347f43c4b7794d775d4c6d7a11bdf62b34a76ab1ac4af3ad67770d74d3060a-runc.At9H65.mount: Deactivated successfully. Feb 12 19:20:19.934233 systemd[1]: Started sshd@10-10.200.20.36:22-10.200.12.6:48602.service. Feb 12 19:20:19.966132 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 19:20:19.966263 kernel: audit: type=1130 audit(1707765619.932:1479): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.36:22-10.200.12.6:48602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:19.932000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.36:22-10.200.12.6:48602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:20.337000 audit[5669]: USER_ACCT pid=5669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.339597 sshd[5669]: Accepted publickey for core from 10.200.12.6 port 48602 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:20.342960 sshd[5669]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:20.341000 audit[5669]: CRED_ACQ pid=5669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.394793 kernel: audit: type=1101 audit(1707765620.337:1480): pid=5669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.394907 kernel: audit: type=1103 audit(1707765620.341:1481): pid=5669 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.371224 systemd-logind[1369]: New session 13 of user core. Feb 12 19:20:20.394860 systemd[1]: Started session-13.scope. Feb 12 19:20:20.412060 kernel: audit: type=1006 audit(1707765620.341:1482): pid=5669 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Feb 12 19:20:20.341000 audit[5669]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdc10f60 a2=3 a3=1 items=0 ppid=1 pid=5669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:20.441732 kernel: audit: type=1300 audit(1707765620.341:1482): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcdc10f60 a2=3 a3=1 items=0 ppid=1 pid=5669 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:20.341000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:20.453378 kernel: audit: type=1327 audit(1707765620.341:1482): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:20.441000 audit[5669]: USER_START pid=5669 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.484707 kernel: audit: type=1105 audit(1707765620.441:1483): pid=5669 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.442000 audit[5671]: CRED_ACQ pid=5671 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.512599 kernel: audit: type=1103 audit(1707765620.442:1484): pid=5671 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.743628 sshd[5669]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:20.743000 audit[5669]: USER_END pid=5669 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.749152 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:20:20.750040 systemd[1]: sshd@10-10.200.20.36:22-10.200.12.6:48602.service: Deactivated successfully. Feb 12 19:20:20.746000 audit[5669]: CRED_DISP pid=5669 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.799196 kernel: audit: type=1106 audit(1707765620.743:1485): pid=5669 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.799311 kernel: audit: type=1104 audit(1707765620.746:1486): pid=5669 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:20.799254 systemd-logind[1369]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:20:20.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.36:22-10.200.12.6:48602 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:20.800185 systemd-logind[1369]: Removed session 13. Feb 12 19:20:20.811518 systemd[1]: Started sshd@11-10.200.20.36:22-10.200.12.6:48614.service. Feb 12 19:20:20.810000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.36:22-10.200.12.6:48614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:21.212000 audit[5682]: USER_ACCT pid=5682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:21.214242 sshd[5682]: Accepted publickey for core from 10.200.12.6 port 48614 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:21.214000 audit[5682]: CRED_ACQ pid=5682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:21.214000 audit[5682]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb2b7b40 a2=3 a3=1 items=0 ppid=1 pid=5682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:21.214000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:21.215892 sshd[5682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:21.220103 systemd[1]: Started session-14.scope. Feb 12 19:20:21.221258 systemd-logind[1369]: New session 14 of user core. Feb 12 19:20:21.224000 audit[5682]: USER_START pid=5682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:21.226000 audit[5686]: CRED_ACQ pid=5686 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:22.657385 sshd[5682]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:22.657000 audit[5682]: USER_END pid=5682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:22.657000 audit[5682]: CRED_DISP pid=5682 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:22.660290 systemd-logind[1369]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:20:22.660485 systemd[1]: sshd@11-10.200.20.36:22-10.200.12.6:48614.service: Deactivated successfully. Feb 12 19:20:22.661236 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:20:22.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.36:22-10.200.12.6:48614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:22.662109 systemd-logind[1369]: Removed session 14. Feb 12 19:20:22.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.36:22-10.200.12.6:48624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:22.724338 systemd[1]: Started sshd@12-10.200.20.36:22-10.200.12.6:48624.service. Feb 12 19:20:23.123000 audit[5695]: USER_ACCT pid=5695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:23.125651 sshd[5695]: Accepted publickey for core from 10.200.12.6 port 48624 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:23.125000 audit[5695]: CRED_ACQ pid=5695 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:23.125000 audit[5695]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe190e8b0 a2=3 a3=1 items=0 ppid=1 pid=5695 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:23.125000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:23.127280 sshd[5695]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:23.131710 systemd[1]: Started session-15.scope. Feb 12 19:20:23.132012 systemd-logind[1369]: New session 15 of user core. Feb 12 19:20:23.134000 audit[5695]: USER_START pid=5695 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:23.135000 audit[5697]: CRED_ACQ pid=5697 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:23.482633 sshd[5695]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:23.482000 audit[5695]: USER_END pid=5695 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:23.482000 audit[5695]: CRED_DISP pid=5695 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:23.485468 systemd-logind[1369]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:20:23.486068 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:20:23.486590 systemd-logind[1369]: Removed session 15. Feb 12 19:20:23.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.36:22-10.200.12.6:48624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:23.487241 systemd[1]: sshd@12-10.200.20.36:22-10.200.12.6:48624.service: Deactivated successfully. Feb 12 19:20:24.153000 audit[5039]: AVC avc: denied { watch } for pid=5039 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.1922864177/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c738 tclass=file permissive=0 Feb 12 19:20:24.153000 audit[5039]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c472e0 a2=fc6 a3=0 items=0 ppid=4703 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 key=(null) Feb 12 19:20:24.153000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:20:24.846000 audit[5075]: AVC avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.3202131218/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c263,c358 tclass=file permissive=0 Feb 12 19:20:24.846000 audit[5075]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=400130ce00 a2=fc6 a3=0 items=0 ppid=4777 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 key=(null) Feb 12 19:20:24.846000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:20:28.584424 kernel: kauditd_printk_skb: 29 callbacks suppressed Feb 12 19:20:28.588477 kernel: audit: type=1130 audit(1707765628.555:1508): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.36:22-10.200.12.6:59126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:28.555000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.36:22-10.200.12.6:59126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:28.555579 systemd[1]: Started sshd@13-10.200.20.36:22-10.200.12.6:59126.service. Feb 12 19:20:28.985000 audit[5728]: USER_ACCT pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:28.987695 sshd[5728]: Accepted publickey for core from 10.200.12.6 port 59126 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:28.994968 sshd[5728]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:28.994000 audit[5728]: CRED_ACQ pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.017030 systemd[1]: Started session-16.scope. Feb 12 19:20:29.018347 systemd-logind[1369]: New session 16 of user core. Feb 12 19:20:29.038550 kernel: audit: type=1101 audit(1707765628.985:1509): pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.038704 kernel: audit: type=1103 audit(1707765628.994:1510): pid=5728 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.057412 kernel: audit: type=1006 audit(1707765628.994:1511): pid=5728 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:20:28.994000 audit[5728]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5556070 a2=3 a3=1 items=0 ppid=1 pid=5728 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:29.088551 kernel: audit: type=1300 audit(1707765628.994:1511): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff5556070 a2=3 a3=1 items=0 ppid=1 pid=5728 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:28.994000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:29.098575 kernel: audit: type=1327 audit(1707765628.994:1511): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:29.039000 audit[5728]: USER_START pid=5728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.128384 kernel: audit: type=1105 audit(1707765629.039:1512): pid=5728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.040000 audit[5733]: CRED_ACQ pid=5733 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.154122 kernel: audit: type=1103 audit(1707765629.040:1513): pid=5733 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.420717 sshd[5728]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:29.421000 audit[5728]: USER_END pid=5728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.424087 systemd-logind[1369]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:20:29.425213 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:20:29.426585 systemd[1]: sshd@13-10.200.20.36:22-10.200.12.6:59126.service: Deactivated successfully. Feb 12 19:20:29.427692 systemd-logind[1369]: Removed session 16. Feb 12 19:20:29.421000 audit[5728]: CRED_DISP pid=5728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.477048 kernel: audit: type=1106 audit(1707765629.421:1514): pid=5728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.477148 kernel: audit: type=1104 audit(1707765629.421:1515): pid=5728 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:29.421000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.36:22-10.200.12.6:59126 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:31.866000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:31.866000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002bac260 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:20:31.866000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:31.866000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:31.866000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002bac280 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:20:31.866000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:31.884000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:31.884000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:31.884000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=4002bac3a0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:20:31.884000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:31.884000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4002e14240 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:20:31.884000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:34.490292 systemd[1]: Started sshd@14-10.200.20.36:22-10.200.12.6:59132.service. Feb 12 19:20:34.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.36:22-10.200.12.6:59132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:34.497968 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:20:34.498089 kernel: audit: type=1130 audit(1707765634.490:1521): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.36:22-10.200.12.6:59132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:34.900000 audit[5743]: USER_ACCT pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.901089 sshd[5743]: Accepted publickey for core from 10.200.12.6 port 59132 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:34.903008 sshd[5743]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:34.908348 systemd[1]: Started session-17.scope. Feb 12 19:20:34.909712 systemd-logind[1369]: New session 17 of user core. Feb 12 19:20:34.902000 audit[5743]: CRED_ACQ pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.955158 kernel: audit: type=1101 audit(1707765634.900:1522): pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.955357 kernel: audit: type=1103 audit(1707765634.902:1523): pid=5743 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.955394 kernel: audit: type=1006 audit(1707765634.902:1524): pid=5743 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 19:20:34.902000 audit[5743]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7cdcf00 a2=3 a3=1 items=0 ppid=1 pid=5743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.999491 kernel: audit: type=1300 audit(1707765634.902:1524): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc7cdcf00 a2=3 a3=1 items=0 ppid=1 pid=5743 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.902000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:35.008820 kernel: audit: type=1327 audit(1707765634.902:1524): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:35.008900 kernel: audit: type=1105 audit(1707765634.915:1525): pid=5743 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.915000 audit[5743]: USER_START pid=5743 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.916000 audit[5746]: CRED_ACQ pid=5746 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:35.062194 kernel: audit: type=1103 audit(1707765634.916:1526): pid=5746 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:35.270659 sshd[5743]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:35.271000 audit[5743]: USER_END pid=5743 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:35.274053 systemd-logind[1369]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:20:35.274868 systemd[1]: sshd@14-10.200.20.36:22-10.200.12.6:59132.service: Deactivated successfully. Feb 12 19:20:35.275694 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:20:35.276966 systemd-logind[1369]: Removed session 17. Feb 12 19:20:35.271000 audit[5743]: CRED_DISP pid=5743 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:35.327629 kernel: audit: type=1106 audit(1707765635.271:1527): pid=5743 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:35.327780 kernel: audit: type=1104 audit(1707765635.271:1528): pid=5743 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:35.274000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.36:22-10.200.12.6:59132 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:40.338027 systemd[1]: Started sshd@15-10.200.20.36:22-10.200.12.6:52614.service. Feb 12 19:20:40.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.36:22-10.200.12.6:52614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:40.347961 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:20:40.348054 kernel: audit: type=1130 audit(1707765640.337:1530): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.36:22-10.200.12.6:52614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:40.736000 audit[5761]: USER_ACCT pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:40.737590 sshd[5761]: Accepted publickey for core from 10.200.12.6 port 52614 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:40.764000 audit[5761]: CRED_ACQ pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:40.765350 sshd[5761]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:40.772247 systemd[1]: Started session-18.scope. Feb 12 19:20:40.774260 systemd-logind[1369]: New session 18 of user core. Feb 12 19:20:40.792010 kernel: audit: type=1101 audit(1707765640.736:1531): pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:40.793514 kernel: audit: type=1103 audit(1707765640.764:1532): pid=5761 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:40.793622 kernel: audit: type=1006 audit(1707765640.764:1533): pid=5761 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 19:20:40.764000 audit[5761]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5144aa0 a2=3 a3=1 items=0 ppid=1 pid=5761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.834588 kernel: audit: type=1300 audit(1707765640.764:1533): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc5144aa0 a2=3 a3=1 items=0 ppid=1 pid=5761 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:40.764000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:40.843333 kernel: audit: type=1327 audit(1707765640.764:1533): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:40.843586 kernel: audit: type=1105 audit(1707765640.778:1534): pid=5761 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:40.778000 audit[5761]: USER_START pid=5761 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:40.781000 audit[5763]: CRED_ACQ pid=5763 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:40.898694 kernel: audit: type=1103 audit(1707765640.781:1535): pid=5763 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:41.115625 sshd[5761]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:41.116000 audit[5761]: USER_END pid=5761 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:41.118910 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:20:41.119752 systemd[1]: sshd@15-10.200.20.36:22-10.200.12.6:52614.service: Deactivated successfully. Feb 12 19:20:41.117000 audit[5761]: CRED_DISP pid=5761 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:41.147712 systemd-logind[1369]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:20:41.148539 systemd-logind[1369]: Removed session 18. Feb 12 19:20:41.170897 kernel: audit: type=1106 audit(1707765641.116:1536): pid=5761 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:41.171023 kernel: audit: type=1104 audit(1707765641.117:1537): pid=5761 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:41.119000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.36:22-10.200.12.6:52614 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:41.887252 systemd[1]: run-containerd-runc-k8s.io-7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235-runc.dwLSuZ.mount: Deactivated successfully. Feb 12 19:20:42.559711 systemd[1]: run-containerd-runc-k8s.io-bac2b16736a67b2f41f6cf75bbe4d54dc09bb24841f96a18a5d18102dcdf3013-runc.dBmgpT.mount: Deactivated successfully. Feb 12 19:20:46.183000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.36:22-10.200.12.6:52628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:46.184039 systemd[1]: Started sshd@16-10.200.20.36:22-10.200.12.6:52628.service. Feb 12 19:20:46.189748 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:20:46.189813 kernel: audit: type=1130 audit(1707765646.183:1539): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.36:22-10.200.12.6:52628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:46.579000 audit[5817]: USER_ACCT pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:46.580277 sshd[5817]: Accepted publickey for core from 10.200.12.6 port 52628 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:46.583657 sshd[5817]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:46.582000 audit[5817]: CRED_ACQ pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:46.632402 kernel: audit: type=1101 audit(1707765646.579:1540): pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:46.632543 kernel: audit: type=1103 audit(1707765646.582:1541): pid=5817 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:46.648194 kernel: audit: type=1006 audit(1707765646.582:1542): pid=5817 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=19 res=1 Feb 12 19:20:46.582000 audit[5817]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb52d400 a2=3 a3=1 items=0 ppid=1 pid=5817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:46.676384 kernel: audit: type=1300 audit(1707765646.582:1542): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffeb52d400 a2=3 a3=1 items=0 ppid=1 pid=5817 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:46.582000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:46.688476 kernel: audit: type=1327 audit(1707765646.582:1542): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:46.690253 systemd-logind[1369]: New session 19 of user core. Feb 12 19:20:46.690770 systemd[1]: Started session-19.scope. Feb 12 19:20:46.694000 audit[5817]: USER_START pid=5817 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:46.723000 audit[5825]: CRED_ACQ pid=5825 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:46.748124 kernel: audit: type=1105 audit(1707765646.694:1543): pid=5817 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:46.748261 kernel: audit: type=1103 audit(1707765646.723:1544): pid=5825 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.012636 sshd[5817]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:47.013000 audit[5817]: USER_END pid=5817 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.015000 audit[5817]: CRED_DISP pid=5817 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.042534 systemd[1]: sshd@16-10.200.20.36:22-10.200.12.6:52628.service: Deactivated successfully. Feb 12 19:20:47.043335 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:20:47.065989 kernel: audit: type=1106 audit(1707765647.013:1545): pid=5817 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.066132 kernel: audit: type=1104 audit(1707765647.015:1546): pid=5817 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.36:22-10.200.12.6:52628 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:47.066735 systemd-logind[1369]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:20:47.067568 systemd-logind[1369]: Removed session 19. Feb 12 19:20:47.079579 systemd[1]: Started sshd@17-10.200.20.36:22-10.200.12.6:32984.service. Feb 12 19:20:47.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.36:22-10.200.12.6:32984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:47.478000 audit[5835]: USER_ACCT pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.479070 sshd[5835]: Accepted publickey for core from 10.200.12.6 port 32984 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:47.479000 audit[5835]: CRED_ACQ pid=5835 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.479000 audit[5835]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff705c420 a2=3 a3=1 items=0 ppid=1 pid=5835 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:47.479000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:47.480688 sshd[5835]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:47.485401 systemd[1]: Started session-20.scope. Feb 12 19:20:47.486102 systemd-logind[1369]: New session 20 of user core. Feb 12 19:20:47.490000 audit[5835]: USER_START pid=5835 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.491000 audit[5837]: CRED_ACQ pid=5837 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.968894 sshd[5835]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:47.969000 audit[5835]: USER_END pid=5835 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.969000 audit[5835]: CRED_DISP pid=5835 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:47.971627 systemd[1]: sshd@17-10.200.20.36:22-10.200.12.6:32984.service: Deactivated successfully. Feb 12 19:20:47.971000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.36:22-10.200.12.6:32984 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:47.972464 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:20:47.973044 systemd-logind[1369]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:20:47.973807 systemd-logind[1369]: Removed session 20. Feb 12 19:20:48.041000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.36:22-10.200.12.6:32994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:48.041721 systemd[1]: Started sshd@18-10.200.20.36:22-10.200.12.6:32994.service. Feb 12 19:20:48.472000 audit[5845]: USER_ACCT pid=5845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.472865 sshd[5845]: Accepted publickey for core from 10.200.12.6 port 32994 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:48.473000 audit[5845]: CRED_ACQ pid=5845 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.473000 audit[5845]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe5720d90 a2=3 a3=1 items=0 ppid=1 pid=5845 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.473000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:48.474653 sshd[5845]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:48.478465 systemd-logind[1369]: New session 21 of user core. Feb 12 19:20:48.479341 systemd[1]: Started session-21.scope. Feb 12 19:20:48.483000 audit[5845]: USER_START pid=5845 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.484000 audit[5847]: CRED_ACQ pid=5847 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:49.681471 sshd[5845]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:49.682000 audit[5845]: USER_END pid=5845 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:49.682000 audit[5845]: CRED_DISP pid=5845 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:49.684828 systemd-logind[1369]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:20:49.685071 systemd[1]: sshd@18-10.200.20.36:22-10.200.12.6:32994.service: Deactivated successfully. Feb 12 19:20:49.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.36:22-10.200.12.6:32994 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:49.685859 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:20:49.686707 systemd-logind[1369]: Removed session 21. Feb 12 19:20:49.731000 audit[5924]: NETFILTER_CFG table=filter:144 family=2 entries=6 op=nft_register_rule pid=5924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.731000 audit[5924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffec547b80 a2=0 a3=ffffaa8c36c0 items=0 ppid=2707 pid=5924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.731000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.733000 audit[5924]: NETFILTER_CFG table=nat:145 family=2 entries=94 op=nft_register_rule pid=5924 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.733000 audit[5924]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffec547b80 a2=0 a3=ffffaa8c36c0 items=0 ppid=2707 pid=5924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.733000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.754147 systemd[1]: Started sshd@19-10.200.20.36:22-10.200.12.6:33000.service. Feb 12 19:20:49.758000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.36:22-10.200.12.6:33000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:49.787000 audit[5953]: NETFILTER_CFG table=filter:146 family=2 entries=18 op=nft_register_rule pid=5953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.787000 audit[5953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10364 a0=3 a1=ffffd7d26e00 a2=0 a3=ffffb54ea6c0 items=0 ppid=2707 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.787000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:49.789000 audit[5953]: NETFILTER_CFG table=nat:147 family=2 entries=94 op=nft_register_rule pid=5953 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:49.789000 audit[5953]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=30372 a0=3 a1=ffffd7d26e00 a2=0 a3=ffffb54ea6c0 items=0 ppid=2707 pid=5953 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:49.789000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:50.168000 audit[5936]: USER_ACCT pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:50.169301 sshd[5936]: Accepted publickey for core from 10.200.12.6 port 33000 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:50.170000 audit[5936]: CRED_ACQ pid=5936 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:50.170000 audit[5936]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc764cac0 a2=3 a3=1 items=0 ppid=1 pid=5936 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:50.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:50.171029 sshd[5936]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:50.175460 systemd-logind[1369]: New session 22 of user core. Feb 12 19:20:50.175964 systemd[1]: Started session-22.scope. Feb 12 19:20:50.180000 audit[5936]: USER_START pid=5936 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:50.181000 audit[5954]: CRED_ACQ pid=5954 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:50.667077 sshd[5936]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:50.667000 audit[5936]: USER_END pid=5936 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:50.667000 audit[5936]: CRED_DISP pid=5936 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:50.669559 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:20:50.670244 systemd-logind[1369]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:20:50.670000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.36:22-10.200.12.6:33000 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:50.670370 systemd[1]: sshd@19-10.200.20.36:22-10.200.12.6:33000.service: Deactivated successfully. Feb 12 19:20:50.671602 systemd-logind[1369]: Removed session 22. Feb 12 19:20:50.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.36:22-10.200.12.6:33002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:50.733682 systemd[1]: Started sshd@20-10.200.20.36:22-10.200.12.6:33002.service. Feb 12 19:20:51.132000 audit[5962]: USER_ACCT pid=5962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:51.133052 sshd[5962]: Accepted publickey for core from 10.200.12.6 port 33002 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:51.134000 audit[5962]: CRED_ACQ pid=5962 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:51.134000 audit[5962]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffef77e40 a2=3 a3=1 items=0 ppid=1 pid=5962 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:51.134000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:51.134815 sshd[5962]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:51.139196 systemd[1]: Started session-23.scope. Feb 12 19:20:51.139691 systemd-logind[1369]: New session 23 of user core. Feb 12 19:20:51.143000 audit[5962]: USER_START pid=5962 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:51.144000 audit[5964]: CRED_ACQ pid=5964 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:51.482608 sshd[5962]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:51.483000 audit[5962]: USER_END pid=5962 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:51.485824 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:20:51.486566 systemd[1]: sshd@20-10.200.20.36:22-10.200.12.6:33002.service: Deactivated successfully. Feb 12 19:20:51.489208 kernel: kauditd_printk_skb: 54 callbacks suppressed Feb 12 19:20:51.489288 kernel: audit: type=1106 audit(1707765651.483:1585): pid=5962 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:51.491945 systemd-logind[1369]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:20:51.492792 systemd-logind[1369]: Removed session 23. Feb 12 19:20:51.484000 audit[5962]: CRED_DISP pid=5962 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:51.540771 kernel: audit: type=1104 audit(1707765651.484:1586): pid=5962 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:51.486000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.36:22-10.200.12.6:33002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:51.563997 kernel: audit: type=1131 audit(1707765651.486:1587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.36:22-10.200.12.6:33002 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:56.196511 systemd[1]: run-containerd-runc-k8s.io-7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235-runc.3J9kHo.mount: Deactivated successfully. Feb 12 19:20:56.378000 audit[6019]: NETFILTER_CFG table=filter:148 family=2 entries=18 op=nft_register_rule pid=6019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:56.378000 audit[6019]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc68f6510 a2=0 a3=ffffa72546c0 items=0 ppid=2707 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:56.424073 kernel: audit: type=1325 audit(1707765656.378:1588): table=filter:148 family=2 entries=18 op=nft_register_rule pid=6019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:56.424216 kernel: audit: type=1300 audit(1707765656.378:1588): arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffc68f6510 a2=0 a3=ffffa72546c0 items=0 ppid=2707 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:56.378000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:56.439547 kernel: audit: type=1327 audit(1707765656.378:1588): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:56.382000 audit[6019]: NETFILTER_CFG table=nat:149 family=2 entries=178 op=nft_register_chain pid=6019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:56.382000 audit[6019]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=72324 a0=3 a1=ffffc68f6510 a2=0 a3=ffffa72546c0 items=0 ppid=2707 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:56.487136 kernel: audit: type=1325 audit(1707765656.382:1589): table=nat:149 family=2 entries=178 op=nft_register_chain pid=6019 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:20:56.487286 kernel: audit: type=1300 audit(1707765656.382:1589): arch=c00000b7 syscall=211 success=yes exit=72324 a0=3 a1=ffffc68f6510 a2=0 a3=ffffa72546c0 items=0 ppid=2707 pid=6019 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:56.382000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:56.504957 kernel: audit: type=1327 audit(1707765656.382:1589): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:20:56.559265 systemd[1]: Started sshd@21-10.200.20.36:22-10.200.12.6:33010.service. Feb 12 19:20:56.558000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.36:22-10.200.12.6:33010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:56.586454 kernel: audit: type=1130 audit(1707765656.558:1590): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.36:22-10.200.12.6:33010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:56.999000 audit[6026]: USER_ACCT pid=6026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.000027 sshd[6026]: Accepted publickey for core from 10.200.12.6 port 33010 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:57.001765 sshd[6026]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:57.001000 audit[6026]: CRED_ACQ pid=6026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.053091 kernel: audit: type=1101 audit(1707765656.999:1591): pid=6026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.053225 kernel: audit: type=1103 audit(1707765657.001:1592): pid=6026 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.056706 systemd[1]: Started session-24.scope. Feb 12 19:20:57.058099 systemd-logind[1369]: New session 24 of user core. Feb 12 19:20:57.068944 kernel: audit: type=1006 audit(1707765657.001:1593): pid=6026 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:20:57.001000 audit[6026]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe364b7a0 a2=3 a3=1 items=0 ppid=1 pid=6026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:57.096104 kernel: audit: type=1300 audit(1707765657.001:1593): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe364b7a0 a2=3 a3=1 items=0 ppid=1 pid=6026 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:57.001000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:57.106120 kernel: audit: type=1327 audit(1707765657.001:1593): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:57.069000 audit[6026]: USER_START pid=6026 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.133820 kernel: audit: type=1105 audit(1707765657.069:1594): pid=6026 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.133993 kernel: audit: type=1103 audit(1707765657.071:1595): pid=6028 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.071000 audit[6028]: CRED_ACQ pid=6028 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.385629 sshd[6026]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:57.386000 audit[6026]: USER_END pid=6026 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.389067 systemd-logind[1369]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:20:57.390181 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:20:57.391358 systemd-logind[1369]: Removed session 24. Feb 12 19:20:57.391983 systemd[1]: sshd@21-10.200.20.36:22-10.200.12.6:33010.service: Deactivated successfully. Feb 12 19:20:57.387000 audit[6026]: CRED_DISP pid=6026 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:57.391000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.36:22-10.200.12.6:33010 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:57.416432 kernel: audit: type=1106 audit(1707765657.386:1596): pid=6026 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:02.463000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.36:22-10.200.12.6:42880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:02.463769 systemd[1]: Started sshd@22-10.200.20.36:22-10.200.12.6:42880.service. Feb 12 19:21:02.469731 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:21:02.469877 kernel: audit: type=1130 audit(1707765662.463:1599): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.36:22-10.200.12.6:42880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:02.870000 audit[6039]: USER_ACCT pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:02.871244 sshd[6039]: Accepted publickey for core from 10.200.12.6 port 42880 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:02.873025 sshd[6039]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:02.872000 audit[6039]: CRED_ACQ pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:02.903280 systemd[1]: Started session-25.scope. Feb 12 19:21:02.904525 systemd-logind[1369]: New session 25 of user core. Feb 12 19:21:02.925607 kernel: audit: type=1101 audit(1707765662.870:1600): pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:02.925732 kernel: audit: type=1103 audit(1707765662.872:1601): pid=6039 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:02.941177 kernel: audit: type=1006 audit(1707765662.872:1602): pid=6039 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 19:21:02.941280 kernel: audit: type=1300 audit(1707765662.872:1602): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed5f9760 a2=3 a3=1 items=0 ppid=1 pid=6039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:02.872000 audit[6039]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffed5f9760 a2=3 a3=1 items=0 ppid=1 pid=6039 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:02.872000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:02.978010 kernel: audit: type=1327 audit(1707765662.872:1602): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:02.978146 kernel: audit: type=1105 audit(1707765662.909:1603): pid=6039 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:02.909000 audit[6039]: USER_START pid=6039 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:02.911000 audit[6041]: CRED_ACQ pid=6041 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.030737 kernel: audit: type=1103 audit(1707765662.911:1604): pid=6041 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.232640 sshd[6039]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:03.233000 audit[6039]: USER_END pid=6039 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.237122 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 19:21:03.237895 systemd[1]: sshd@22-10.200.20.36:22-10.200.12.6:42880.service: Deactivated successfully. Feb 12 19:21:03.235000 audit[6039]: CRED_DISP pid=6039 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.291474 kernel: audit: type=1106 audit(1707765663.233:1605): pid=6039 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.291609 kernel: audit: type=1104 audit(1707765663.235:1606): pid=6039 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.237000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.36:22-10.200.12.6:42880 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:03.291752 systemd-logind[1369]: Session 25 logged out. Waiting for processes to exit. Feb 12 19:21:03.292596 systemd-logind[1369]: Removed session 25. Feb 12 19:21:08.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.36:22-10.200.12.6:45058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:08.300726 systemd[1]: Started sshd@23-10.200.20.36:22-10.200.12.6:45058.service. Feb 12 19:21:08.306320 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:21:08.306442 kernel: audit: type=1130 audit(1707765668.300:1608): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.36:22-10.200.12.6:45058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:08.700000 audit[6054]: USER_ACCT pid=6054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:08.701269 sshd[6054]: Accepted publickey for core from 10.200.12.6 port 45058 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:08.703141 sshd[6054]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:08.702000 audit[6054]: CRED_ACQ pid=6054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:08.751649 kernel: audit: type=1101 audit(1707765668.700:1609): pid=6054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:08.751777 kernel: audit: type=1103 audit(1707765668.702:1610): pid=6054 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:08.755767 systemd-logind[1369]: New session 26 of user core. Feb 12 19:21:08.756345 systemd[1]: Started session-26.scope. Feb 12 19:21:08.768236 kernel: audit: type=1006 audit(1707765668.702:1611): pid=6054 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 19:21:08.702000 audit[6054]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff252ea40 a2=3 a3=1 items=0 ppid=1 pid=6054 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:08.795369 kernel: audit: type=1300 audit(1707765668.702:1611): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff252ea40 a2=3 a3=1 items=0 ppid=1 pid=6054 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:08.796695 kernel: audit: type=1327 audit(1707765668.702:1611): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:08.702000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:08.761000 audit[6054]: USER_START pid=6054 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:08.835822 kernel: audit: type=1105 audit(1707765668.761:1612): pid=6054 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:08.762000 audit[6056]: CRED_ACQ pid=6056 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:08.859486 kernel: audit: type=1103 audit(1707765668.762:1613): pid=6056 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:09.053148 sshd[6054]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:09.053000 audit[6054]: USER_END pid=6054 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:09.055986 systemd-logind[1369]: Session 26 logged out. Waiting for processes to exit. Feb 12 19:21:09.057098 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 19:21:09.058236 systemd-logind[1369]: Removed session 26. Feb 12 19:21:09.058903 systemd[1]: sshd@23-10.200.20.36:22-10.200.12.6:45058.service: Deactivated successfully. Feb 12 19:21:09.053000 audit[6054]: CRED_DISP pid=6054 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:09.107766 kernel: audit: type=1106 audit(1707765669.053:1614): pid=6054 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:09.107943 kernel: audit: type=1104 audit(1707765669.053:1615): pid=6054 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:09.058000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.36:22-10.200.12.6:45058 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:12.557097 systemd[1]: run-containerd-runc-k8s.io-bac2b16736a67b2f41f6cf75bbe4d54dc09bb24841f96a18a5d18102dcdf3013-runc.fOkxzM.mount: Deactivated successfully. Feb 12 19:21:14.119765 systemd[1]: Started sshd@24-10.200.20.36:22-10.200.12.6:45068.service. Feb 12 19:21:14.120000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.36:22-10.200.12.6:45068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:14.126640 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:21:14.126712 kernel: audit: type=1130 audit(1707765674.120:1617): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.36:22-10.200.12.6:45068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:14.519000 audit[6089]: USER_ACCT pid=6089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:14.521603 sshd[6089]: Accepted publickey for core from 10.200.12.6 port 45068 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:14.549190 kernel: audit: type=1101 audit(1707765674.519:1618): pid=6089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:14.549999 sshd[6089]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:14.549000 audit[6089]: CRED_ACQ pid=6089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:14.600303 kernel: audit: type=1103 audit(1707765674.549:1619): pid=6089 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:14.600465 kernel: audit: type=1006 audit(1707765674.549:1620): pid=6089 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 19:21:14.549000 audit[6089]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe38ba140 a2=3 a3=1 items=0 ppid=1 pid=6089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:14.631247 kernel: audit: type=1300 audit(1707765674.549:1620): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe38ba140 a2=3 a3=1 items=0 ppid=1 pid=6089 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:14.630382 systemd[1]: Started session-27.scope. Feb 12 19:21:14.631284 systemd-logind[1369]: New session 27 of user core. Feb 12 19:21:14.549000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:14.641399 kernel: audit: type=1327 audit(1707765674.549:1620): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:14.645000 audit[6089]: USER_START pid=6089 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:14.677000 audit[6103]: CRED_ACQ pid=6103 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:14.703957 kernel: audit: type=1105 audit(1707765674.645:1621): pid=6089 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:14.704078 kernel: audit: type=1103 audit(1707765674.677:1622): pid=6103 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:14.970672 sshd[6089]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:14.971000 audit[6089]: USER_END pid=6089 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:14.973683 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 19:21:14.974458 systemd[1]: sshd@24-10.200.20.36:22-10.200.12.6:45068.service: Deactivated successfully. Feb 12 19:21:14.972000 audit[6089]: CRED_DISP pid=6089 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:15.028092 kernel: audit: type=1106 audit(1707765674.971:1623): pid=6089 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:15.028245 kernel: audit: type=1104 audit(1707765674.972:1624): pid=6089 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:15.028324 systemd-logind[1369]: Session 27 logged out. Waiting for processes to exit. Feb 12 19:21:14.974000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.36:22-10.200.12.6:45068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:15.029299 systemd-logind[1369]: Removed session 27. Feb 12 19:21:17.199000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:17.199000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=c a1=40026525a0 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:21:17.199000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:17.199000 audit[2420]: AVC avc: denied { watch } for pid=2420 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:17.199000 audit[2420]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40014e2360 a2=fc6 a3=0 items=0 ppid=2258 pid=2420 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c507,c597 key=(null) Feb 12 19:21:17.199000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:17.765000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521260 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:17.765000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=40135a0fc0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:21:17.765000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:17.766000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:17.766000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4001ded260 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:21:17.766000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:17.767000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:17.767000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521266 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:17.767000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=40135a1020 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:21:17.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:17.767000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4013dce7e0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:21:17.767000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:17.855000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521264 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:17.855000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=77 a1=4013dce930 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:21:17.855000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:17.856000 audit[2395]: AVC avc: denied { watch } for pid=2395 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:17.856000 audit[2395]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=76 a1=4001ded4c0 a2=fc6 a3=0 items=0 ppid=2255 pid=2395 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c2,c511 key=(null) Feb 12 19:21:17.856000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3336002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:20.078687 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 19:21:20.078827 kernel: audit: type=1130 audit(1707765680.046:1634): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.36:22-10.200.12.6:54686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:20.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.36:22-10.200.12.6:54686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:20.046341 systemd[1]: Started sshd@25-10.200.20.36:22-10.200.12.6:54686.service. Feb 12 19:21:20.477000 audit[6154]: USER_ACCT pid=6154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.479591 sshd[6154]: Accepted publickey for core from 10.200.12.6 port 54686 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:20.482941 sshd[6154]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:20.482000 audit[6154]: CRED_ACQ pid=6154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.533537 kernel: audit: type=1101 audit(1707765680.477:1635): pid=6154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.533676 kernel: audit: type=1103 audit(1707765680.482:1636): pid=6154 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.550299 kernel: audit: type=1006 audit(1707765680.482:1637): pid=6154 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 12 19:21:20.482000 audit[6154]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc798ff10 a2=3 a3=1 items=0 ppid=1 pid=6154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:20.579079 kernel: audit: type=1300 audit(1707765680.482:1637): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc798ff10 a2=3 a3=1 items=0 ppid=1 pid=6154 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:20.581101 systemd-logind[1369]: New session 28 of user core. Feb 12 19:21:20.482000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:20.585131 systemd[1]: Started session-28.scope. Feb 12 19:21:20.591285 kernel: audit: type=1327 audit(1707765680.482:1637): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:20.595000 audit[6154]: USER_START pid=6154 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.595000 audit[6156]: CRED_ACQ pid=6156 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.650370 kernel: audit: type=1105 audit(1707765680.595:1638): pid=6154 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.650505 kernel: audit: type=1103 audit(1707765680.595:1639): pid=6156 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.910160 sshd[6154]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:20.910000 audit[6154]: USER_END pid=6154 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.911000 audit[6154]: CRED_DISP pid=6154 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.943887 systemd-logind[1369]: Session 28 logged out. Waiting for processes to exit. Feb 12 19:21:20.945205 systemd[1]: session-28.scope: Deactivated successfully. Feb 12 19:21:20.946377 systemd-logind[1369]: Removed session 28. Feb 12 19:21:20.947030 systemd[1]: sshd@25-10.200.20.36:22-10.200.12.6:54686.service: Deactivated successfully. Feb 12 19:21:20.967268 kernel: audit: type=1106 audit(1707765680.910:1640): pid=6154 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.967386 kernel: audit: type=1104 audit(1707765680.911:1641): pid=6154 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:20.946000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.36:22-10.200.12.6:54686 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:24.154000 audit[5039]: AVC avc: denied { watch } for pid=5039 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.1922864177/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c39,c738 tclass=file permissive=0 Feb 12 19:21:24.154000 audit[5039]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40005a15c0 a2=fc6 a3=0 items=0 ppid=4703 pid=5039 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c39,c738 key=(null) Feb 12 19:21:24.154000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:21:24.850000 audit[5075]: AVC avc: denied { watch } for pid=5075 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_19.3202131218/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c263,c358 tclass=file permissive=0 Feb 12 19:21:24.850000 audit[5075]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000c6d260 a2=fc6 a3=0 items=0 ppid=4777 pid=5075 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c263,c358 key=(null) Feb 12 19:21:24.850000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:21:25.980061 systemd[1]: Started sshd@26-10.200.20.36:22-10.200.12.6:54694.service. Feb 12 19:21:25.990574 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:21:25.990683 kernel: audit: type=1130 audit(1707765685.979:1645): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.36:22-10.200.12.6:54694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:25.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.36:22-10.200.12.6:54694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:26.195191 systemd[1]: run-containerd-runc-k8s.io-7464f554226f96a98d0674f6a6dadc7fbabb99f39a33cd1b7ac1eac0624ce235-runc.FraFSE.mount: Deactivated successfully. Feb 12 19:21:26.379000 audit[6167]: USER_ACCT pid=6167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.380559 sshd[6167]: Accepted publickey for core from 10.200.12.6 port 54694 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:26.382351 sshd[6167]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:26.381000 audit[6167]: CRED_ACQ pid=6167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.438612 kernel: audit: type=1101 audit(1707765686.379:1646): pid=6167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.438756 kernel: audit: type=1103 audit(1707765686.381:1647): pid=6167 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.456397 kernel: audit: type=1006 audit(1707765686.381:1648): pid=6167 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=29 res=1 Feb 12 19:21:26.456776 kernel: audit: type=1300 audit(1707765686.381:1648): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc1a9a20 a2=3 a3=1 items=0 ppid=1 pid=6167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:26.381000 audit[6167]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc1a9a20 a2=3 a3=1 items=0 ppid=1 pid=6167 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=29 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:26.457612 systemd-logind[1369]: New session 29 of user core. Feb 12 19:21:26.458678 systemd[1]: Started session-29.scope. Feb 12 19:21:26.381000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:26.501209 kernel: audit: type=1327 audit(1707765686.381:1648): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:26.501000 audit[6167]: USER_START pid=6167 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.533115 kernel: audit: type=1105 audit(1707765686.501:1649): pid=6167 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.507000 audit[6187]: CRED_ACQ pid=6187 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.559320 kernel: audit: type=1103 audit(1707765686.507:1650): pid=6187 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.805906 sshd[6167]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:26.806000 audit[6167]: USER_END pid=6167 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.808767 systemd-logind[1369]: Session 29 logged out. Waiting for processes to exit. Feb 12 19:21:26.809806 systemd[1]: session-29.scope: Deactivated successfully. Feb 12 19:21:26.810745 systemd[1]: sshd@26-10.200.20.36:22-10.200.12.6:54694.service: Deactivated successfully. Feb 12 19:21:26.812202 systemd-logind[1369]: Removed session 29. Feb 12 19:21:26.806000 audit[6167]: CRED_DISP pid=6167 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.865009 kernel: audit: type=1106 audit(1707765686.806:1651): pid=6167 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.865160 kernel: audit: type=1104 audit(1707765686.806:1652): pid=6167 uid=0 auid=500 ses=29 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:26.810000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@26-10.200.20.36:22-10.200.12.6:54694 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:30.519442 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.537463 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.553972 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.571093 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.588428 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.605275 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.605536 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.636003 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.636272 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.636381 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.655951 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.656227 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.685875 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.686164 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.686296 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.705481 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.705813 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.735496 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.735781 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.735890 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.754979 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.755279 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.775051 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.775430 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.795063 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:21:30.795330 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#114 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001