Feb 12 19:14:59.062616 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:14:59.062636 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:14:59.062644 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 12 19:14:59.062651 kernel: printk: bootconsole [pl11] enabled Feb 12 19:14:59.062656 kernel: efi: EFI v2.70 by EDK II Feb 12 19:14:59.062662 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef3c198 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 12 19:14:59.062668 kernel: random: crng init done Feb 12 19:14:59.062674 kernel: ACPI: Early table checksum verification disabled Feb 12 19:14:59.062679 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 12 19:14:59.062684 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:59.062690 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:59.062696 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:14:59.062702 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:59.062707 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:59.062714 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:59.062720 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:59.062726 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:59.062733 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:59.062738 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 12 19:14:59.062744 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:14:59.062750 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 12 19:14:59.062755 kernel: NUMA: Failed to initialise from firmware Feb 12 19:14:59.062761 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:14:59.062767 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Feb 12 19:14:59.062772 kernel: Zone ranges: Feb 12 19:14:59.062778 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 12 19:14:59.062783 kernel: DMA32 empty Feb 12 19:14:59.062790 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:14:59.062796 kernel: Movable zone start for each node Feb 12 19:14:59.062802 kernel: Early memory node ranges Feb 12 19:14:59.062807 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 12 19:14:59.062813 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 12 19:14:59.062818 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 12 19:14:59.062824 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 12 19:14:59.062830 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 12 19:14:59.062835 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 12 19:14:59.062841 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 12 19:14:59.062847 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 12 19:14:59.062852 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:14:59.062860 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:14:59.062868 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 12 19:14:59.062874 kernel: psci: probing for conduit method from ACPI. Feb 12 19:14:59.062880 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:14:59.062886 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:14:59.062893 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 12 19:14:59.062899 kernel: psci: SMC Calling Convention v1.4 Feb 12 19:14:59.062905 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 12 19:14:59.062911 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 12 19:14:59.062917 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:14:59.062924 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:14:59.062930 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 12 19:14:59.062936 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:14:59.062942 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:14:59.062948 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:14:59.062954 kernel: CPU features: detected: Spectre-BHB Feb 12 19:14:59.062960 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:14:59.062967 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:14:59.062973 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:14:59.062979 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 12 19:14:59.062985 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 12 19:14:59.062991 kernel: Policy zone: Normal Feb 12 19:14:59.062999 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:14:59.063006 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:14:59.063012 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:14:59.063018 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:14:59.063024 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:14:59.063031 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 12 19:14:59.063038 kernel: Memory: 3991936K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202224K reserved, 0K cma-reserved) Feb 12 19:14:59.063044 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:14:59.063050 kernel: trace event string verifier disabled Feb 12 19:14:59.063056 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:14:59.063062 kernel: rcu: RCU event tracing is enabled. Feb 12 19:14:59.063069 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:14:59.063075 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:14:59.063081 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:14:59.063087 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:14:59.063093 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:14:59.063100 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:14:59.063107 kernel: GICv3: 960 SPIs implemented Feb 12 19:14:59.063113 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:14:59.063119 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:14:59.063125 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:14:59.063131 kernel: GICv3: 16 PPIs implemented Feb 12 19:14:59.063137 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 12 19:14:59.063144 kernel: ITS: No ITS available, not enabling LPIs Feb 12 19:14:59.063150 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:14:59.063156 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:14:59.063162 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:14:59.063168 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:14:59.063176 kernel: Console: colour dummy device 80x25 Feb 12 19:14:59.063182 kernel: printk: console [tty1] enabled Feb 12 19:14:59.063189 kernel: ACPI: Core revision 20210730 Feb 12 19:14:59.063195 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:14:59.063201 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:14:59.063208 kernel: LSM: Security Framework initializing Feb 12 19:14:59.063214 kernel: SELinux: Initializing. Feb 12 19:14:59.063220 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:14:59.063226 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:14:59.063234 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 12 19:14:59.063240 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 12 19:14:59.063246 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:14:59.063252 kernel: Remapping and enabling EFI services. Feb 12 19:14:59.063258 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:14:59.063265 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:14:59.063271 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 12 19:14:59.063277 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:14:59.063284 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:14:59.063291 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:14:59.063297 kernel: SMP: Total of 2 processors activated. Feb 12 19:14:59.063303 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:14:59.063310 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 12 19:14:59.063316 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:14:59.063322 kernel: CPU features: detected: CRC32 instructions Feb 12 19:14:59.063329 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:14:59.063335 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:14:59.063341 kernel: CPU features: detected: Privileged Access Never Feb 12 19:14:59.063349 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:14:59.063355 kernel: alternatives: patching kernel code Feb 12 19:14:59.063366 kernel: devtmpfs: initialized Feb 12 19:14:59.063373 kernel: KASLR enabled Feb 12 19:14:59.063380 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:14:59.063387 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:14:59.063393 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:14:59.063400 kernel: SMBIOS 3.1.0 present. Feb 12 19:14:59.063406 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:14:59.063413 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:14:59.063421 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:14:59.063428 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:14:59.063435 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:14:59.063442 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:14:59.063448 kernel: audit: type=2000 audit(0.088:1): state=initialized audit_enabled=0 res=1 Feb 12 19:14:59.063468 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:14:59.063476 kernel: cpuidle: using governor menu Feb 12 19:14:59.063484 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:14:59.063491 kernel: ASID allocator initialised with 32768 entries Feb 12 19:14:59.063497 kernel: ACPI: bus type PCI registered Feb 12 19:14:59.063504 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:14:59.063510 kernel: Serial: AMBA PL011 UART driver Feb 12 19:14:59.063517 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:14:59.063524 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:14:59.063530 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:14:59.063537 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:14:59.063545 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:14:59.063552 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:14:59.063558 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:14:59.063565 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:14:59.063571 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:14:59.063578 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:14:59.063584 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:14:59.063590 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:14:59.063597 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:14:59.063605 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:14:59.063611 kernel: ACPI: Interpreter enabled Feb 12 19:14:59.063618 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:14:59.063624 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:14:59.063631 kernel: printk: console [ttyAMA0] enabled Feb 12 19:14:59.063637 kernel: printk: bootconsole [pl11] disabled Feb 12 19:14:59.063644 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 12 19:14:59.063650 kernel: iommu: Default domain type: Translated Feb 12 19:14:59.063657 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:14:59.063665 kernel: vgaarb: loaded Feb 12 19:14:59.063671 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:14:59.063678 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:14:59.063684 kernel: PTP clock support registered Feb 12 19:14:59.063691 kernel: Registered efivars operations Feb 12 19:14:59.063697 kernel: No ACPI PMU IRQ for CPU0 Feb 12 19:14:59.063704 kernel: No ACPI PMU IRQ for CPU1 Feb 12 19:14:59.063710 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:14:59.063716 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:14:59.063724 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:14:59.063731 kernel: pnp: PnP ACPI init Feb 12 19:14:59.063737 kernel: pnp: PnP ACPI: found 0 devices Feb 12 19:14:59.063744 kernel: NET: Registered PF_INET protocol family Feb 12 19:14:59.063750 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:14:59.063757 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:14:59.063764 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:14:59.063770 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:14:59.063777 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:14:59.063785 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:14:59.063792 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:14:59.063798 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:14:59.063805 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:14:59.063811 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:14:59.063818 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 12 19:14:59.063825 kernel: kvm [1]: HYP mode not available Feb 12 19:14:59.063831 kernel: Initialise system trusted keyrings Feb 12 19:14:59.063838 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:14:59.063845 kernel: Key type asymmetric registered Feb 12 19:14:59.063852 kernel: Asymmetric key parser 'x509' registered Feb 12 19:14:59.063858 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:14:59.063865 kernel: io scheduler mq-deadline registered Feb 12 19:14:59.063871 kernel: io scheduler kyber registered Feb 12 19:14:59.063878 kernel: io scheduler bfq registered Feb 12 19:14:59.063884 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:14:59.063891 kernel: thunder_xcv, ver 1.0 Feb 12 19:14:59.063897 kernel: thunder_bgx, ver 1.0 Feb 12 19:14:59.063905 kernel: nicpf, ver 1.0 Feb 12 19:14:59.063911 kernel: nicvf, ver 1.0 Feb 12 19:14:59.064027 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:14:59.064088 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:14:58 UTC (1707765298) Feb 12 19:14:59.064097 kernel: efifb: probing for efifb Feb 12 19:14:59.064103 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:14:59.064110 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:14:59.064116 kernel: efifb: scrolling: redraw Feb 12 19:14:59.064125 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:14:59.064132 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:14:59.064138 kernel: fb0: EFI VGA frame buffer device Feb 12 19:14:59.064145 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 12 19:14:59.064152 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:14:59.064158 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:14:59.064165 kernel: Segment Routing with IPv6 Feb 12 19:14:59.064171 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:14:59.064178 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:14:59.064186 kernel: Key type dns_resolver registered Feb 12 19:14:59.064192 kernel: registered taskstats version 1 Feb 12 19:14:59.064199 kernel: Loading compiled-in X.509 certificates Feb 12 19:14:59.064206 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:14:59.064212 kernel: Key type .fscrypt registered Feb 12 19:14:59.064218 kernel: Key type fscrypt-provisioning registered Feb 12 19:14:59.064225 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:14:59.064232 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:14:59.064238 kernel: ima: No architecture policies found Feb 12 19:14:59.064246 kernel: Freeing unused kernel memory: 34688K Feb 12 19:14:59.064253 kernel: Run /init as init process Feb 12 19:14:59.064259 kernel: with arguments: Feb 12 19:14:59.064266 kernel: /init Feb 12 19:14:59.064272 kernel: with environment: Feb 12 19:14:59.064278 kernel: HOME=/ Feb 12 19:14:59.064285 kernel: TERM=linux Feb 12 19:14:59.064291 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:14:59.064300 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:14:59.064310 systemd[1]: Detected virtualization microsoft. Feb 12 19:14:59.064317 systemd[1]: Detected architecture arm64. Feb 12 19:14:59.064324 systemd[1]: Running in initrd. Feb 12 19:14:59.064331 systemd[1]: No hostname configured, using default hostname. Feb 12 19:14:59.064338 systemd[1]: Hostname set to . Feb 12 19:14:59.064345 systemd[1]: Initializing machine ID from random generator. Feb 12 19:14:59.064352 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:14:59.064360 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:14:59.064367 systemd[1]: Reached target cryptsetup.target. Feb 12 19:14:59.064374 systemd[1]: Reached target paths.target. Feb 12 19:14:59.064381 systemd[1]: Reached target slices.target. Feb 12 19:14:59.064388 systemd[1]: Reached target swap.target. Feb 12 19:14:59.064395 systemd[1]: Reached target timers.target. Feb 12 19:14:59.064402 systemd[1]: Listening on iscsid.socket. Feb 12 19:14:59.064409 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:14:59.064418 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:14:59.064425 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:14:59.064432 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:14:59.064439 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:14:59.064446 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:14:59.064464 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:14:59.064471 systemd[1]: Reached target sockets.target. Feb 12 19:14:59.064479 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:14:59.064485 systemd[1]: Finished network-cleanup.service. Feb 12 19:14:59.064494 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:14:59.064502 systemd[1]: Starting systemd-journald.service... Feb 12 19:14:59.064509 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:14:59.064516 systemd[1]: Starting systemd-resolved.service... Feb 12 19:14:59.064523 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:14:59.064534 systemd-journald[276]: Journal started Feb 12 19:14:59.064571 systemd-journald[276]: Runtime Journal (/run/log/journal/1cf6883019564958aaee86908555dc0e) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:14:59.049498 systemd-modules-load[277]: Inserted module 'overlay' Feb 12 19:14:59.089592 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:14:59.105861 systemd-resolved[278]: Positive Trust Anchors: Feb 12 19:14:59.114863 kernel: Bridge firewalling registered Feb 12 19:14:59.114885 systemd[1]: Started systemd-journald.service. Feb 12 19:14:59.106029 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:14:59.156953 kernel: audit: type=1130 audit(1707765299.126:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.126000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.106057 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:14:59.230986 kernel: SCSI subsystem initialized Feb 12 19:14:59.231006 kernel: audit: type=1130 audit(1707765299.170:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.170000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.114189 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 12 19:14:59.277815 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:14:59.277834 kernel: audit: type=1130 audit(1707765299.236:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.277843 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:14:59.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.120860 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 12 19:14:59.316944 kernel: audit: type=1130 audit(1707765299.282:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.316967 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:14:59.282000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.156865 systemd[1]: Started systemd-resolved.service. Feb 12 19:14:59.348262 kernel: audit: type=1130 audit(1707765299.322:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.170988 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:14:59.253949 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:14:59.283518 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:14:59.323389 systemd[1]: Reached target nss-lookup.target. Feb 12 19:14:59.348210 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 12 19:14:59.426264 kernel: audit: type=1130 audit(1707765299.399:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.399000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.364937 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:14:59.432000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.371377 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:14:59.379146 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:14:59.497896 kernel: audit: type=1130 audit(1707765299.432:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.497919 kernel: audit: type=1130 audit(1707765299.472:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.472000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.422544 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:14:59.459531 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:14:59.505875 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:14:59.523292 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:14:59.536086 dracut-cmdline[297]: dracut-dracut-053 Feb 12 19:14:59.538549 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:14:59.546322 dracut-cmdline[297]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:14:59.614371 kernel: audit: type=1130 audit(1707765299.552:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.552000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.661476 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:14:59.674472 kernel: iscsi: registered transport (tcp) Feb 12 19:14:59.696033 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:14:59.696072 kernel: QLogic iSCSI HBA Driver Feb 12 19:14:59.725891 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:14:59.731000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:14:59.732424 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:14:59.788474 kernel: raid6: neonx8 gen() 13812 MB/s Feb 12 19:14:59.809465 kernel: raid6: neonx8 xor() 10837 MB/s Feb 12 19:14:59.831466 kernel: raid6: neonx4 gen() 13529 MB/s Feb 12 19:14:59.852464 kernel: raid6: neonx4 xor() 11248 MB/s Feb 12 19:14:59.873463 kernel: raid6: neonx2 gen() 12982 MB/s Feb 12 19:14:59.895464 kernel: raid6: neonx2 xor() 10362 MB/s Feb 12 19:14:59.916464 kernel: raid6: neonx1 gen() 10532 MB/s Feb 12 19:14:59.937463 kernel: raid6: neonx1 xor() 8797 MB/s Feb 12 19:14:59.959464 kernel: raid6: int64x8 gen() 6298 MB/s Feb 12 19:14:59.980463 kernel: raid6: int64x8 xor() 3551 MB/s Feb 12 19:15:00.001463 kernel: raid6: int64x4 gen() 7294 MB/s Feb 12 19:15:00.022465 kernel: raid6: int64x4 xor() 3854 MB/s Feb 12 19:15:00.043462 kernel: raid6: int64x2 gen() 6158 MB/s Feb 12 19:15:00.064467 kernel: raid6: int64x2 xor() 3324 MB/s Feb 12 19:15:00.087464 kernel: raid6: int64x1 gen() 5047 MB/s Feb 12 19:15:00.112272 kernel: raid6: int64x1 xor() 2649 MB/s Feb 12 19:15:00.112281 kernel: raid6: using algorithm neonx8 gen() 13812 MB/s Feb 12 19:15:00.112289 kernel: raid6: .... xor() 10837 MB/s, rmw enabled Feb 12 19:15:00.116478 kernel: raid6: using neon recovery algorithm Feb 12 19:15:00.139209 kernel: xor: measuring software checksum speed Feb 12 19:15:00.139222 kernel: 8regs : 17297 MB/sec Feb 12 19:15:00.148190 kernel: 32regs : 20755 MB/sec Feb 12 19:15:00.148203 kernel: arm64_neon : 27920 MB/sec Feb 12 19:15:00.148211 kernel: xor: using function: arm64_neon (27920 MB/sec) Feb 12 19:15:00.208470 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:15:00.218002 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:15:00.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:00.226000 audit: BPF prog-id=7 op=LOAD Feb 12 19:15:00.226000 audit: BPF prog-id=8 op=LOAD Feb 12 19:15:00.227112 systemd[1]: Starting systemd-udevd.service... Feb 12 19:15:00.246524 systemd-udevd[476]: Using default interface naming scheme 'v252'. Feb 12 19:15:00.259000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:00.252877 systemd[1]: Started systemd-udevd.service. Feb 12 19:15:00.265430 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:15:00.282368 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Feb 12 19:15:00.315243 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:15:00.321000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:00.322182 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:15:00.360988 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:15:00.373000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:00.419480 kernel: hv_vmbus: Vmbus version:5.3 Feb 12 19:15:00.426487 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:15:00.426526 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:15:00.443204 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Feb 12 19:15:00.443253 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Feb 12 19:15:00.465856 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:15:00.474490 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:15:00.480483 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:15:00.480539 kernel: scsi host1: storvsc_host_t Feb 12 19:15:00.501063 kernel: scsi host0: storvsc_host_t Feb 12 19:15:00.501266 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:15:00.510389 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:15:00.536731 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 12 19:15:00.536945 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:15:00.550096 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:15:00.550312 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:15:00.550396 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 19:15:00.555477 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:15:00.555608 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:15:00.564476 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:15:00.571478 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:15:00.576479 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 19:15:00.613652 kernel: hv_netvsc 002248c1-8d18-0022-48c1-8d18002248c1 eth0: VF slot 1 added Feb 12 19:15:00.623486 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:15:00.640317 kernel: hv_pci 051c66f8-a11c-4a95-be78-413b423f65c8: PCI VMBus probing: Using version 0x10004 Feb 12 19:15:00.655069 kernel: hv_pci 051c66f8-a11c-4a95-be78-413b423f65c8: PCI host bridge to bus a11c:00 Feb 12 19:15:00.655251 kernel: pci_bus a11c:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 12 19:15:00.655486 kernel: pci_bus a11c:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:15:00.672671 kernel: pci a11c:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 12 19:15:00.686478 kernel: pci a11c:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:15:00.709650 kernel: pci a11c:00:02.0: enabling Extended Tags Feb 12 19:15:00.735960 kernel: pci a11c:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at a11c:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 12 19:15:00.824994 kernel: pci_bus a11c:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:15:00.825226 kernel: pci a11c:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:15:00.868487 kernel: mlx5_core a11c:00:02.0: firmware version: 16.30.1284 Feb 12 19:15:01.029156 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:15:01.051477 kernel: mlx5_core a11c:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 12 19:15:01.105477 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (534) Feb 12 19:15:01.119710 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:15:01.147092 kernel: hv_netvsc 002248c1-8d18-0022-48c1-8d18002248c1 eth0: VF registering: eth1 Feb 12 19:15:01.147300 kernel: mlx5_core a11c:00:02.0 eth1: joined to eth0 Feb 12 19:15:01.164480 kernel: mlx5_core a11c:00:02.0 enP41244s1: renamed from eth1 Feb 12 19:15:01.292977 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:15:01.299849 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:15:01.313844 systemd[1]: Starting disk-uuid.service... Feb 12 19:15:01.334369 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:15:01.357483 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:15:01.368479 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:15:02.376878 disk-uuid[598]: The operation has completed successfully. Feb 12 19:15:02.382540 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:15:02.441010 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:15:02.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:02.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:02.441111 systemd[1]: Finished disk-uuid.service. Feb 12 19:15:02.447062 systemd[1]: Starting verity-setup.service... Feb 12 19:15:02.529484 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:15:02.724261 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:15:02.736735 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:15:02.742574 systemd[1]: Finished verity-setup.service. Feb 12 19:15:02.751000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:02.808489 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:15:02.808852 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:15:02.813931 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:15:02.814729 systemd[1]: Starting ignition-setup.service... Feb 12 19:15:02.834254 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:15:02.870684 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:15:02.870745 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:15:02.876750 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:15:02.938144 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:15:02.943000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:02.949000 audit: BPF prog-id=9 op=LOAD Feb 12 19:15:02.950172 systemd[1]: Starting systemd-networkd.service... Feb 12 19:15:02.983004 systemd-networkd[836]: lo: Link UP Feb 12 19:15:02.987286 systemd-networkd[836]: lo: Gained carrier Feb 12 19:15:02.987825 systemd-networkd[836]: Enumeration completed Feb 12 19:15:02.997000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:02.991969 systemd[1]: Started systemd-networkd.service. Feb 12 19:15:03.039230 kernel: kauditd_printk_skb: 12 callbacks suppressed Feb 12 19:15:03.039253 kernel: audit: type=1130 audit(1707765302.997:23): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:02.992818 systemd-networkd[836]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:15:02.997800 systemd[1]: Reached target network.target. Feb 12 19:15:03.082795 kernel: audit: type=1130 audit(1707765303.063:24): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.034916 systemd[1]: Starting iscsiuio.service... Feb 12 19:15:03.044128 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:15:03.052985 systemd[1]: Started iscsiuio.service. Feb 12 19:15:03.096427 systemd[1]: Starting iscsid.service... Feb 12 19:15:03.100881 iscsid[848]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:15:03.100881 iscsid[848]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:15:03.100881 iscsid[848]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:15:03.100881 iscsid[848]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:15:03.100881 iscsid[848]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:15:03.100881 iscsid[848]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:15:03.246923 kernel: audit: type=1130 audit(1707765303.115:25): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.246952 kernel: audit: type=1130 audit(1707765303.174:26): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.246962 kernel: mlx5_core a11c:00:02.0 enP41244s1: Link up Feb 12 19:15:03.115000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.174000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.112189 systemd[1]: Started iscsid.service. Feb 12 19:15:03.132597 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:15:03.169618 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:15:03.175055 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:15:03.320310 kernel: hv_netvsc 002248c1-8d18-0022-48c1-8d18002248c1 eth0: Data path switched to VF: enP41244s1 Feb 12 19:15:03.320487 kernel: audit: type=1130 audit(1707765303.280:27): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.320499 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:15:03.280000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.208488 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:15:03.222653 systemd[1]: Reached target remote-fs.target. Feb 12 19:15:03.362410 kernel: audit: type=1130 audit(1707765303.333:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.333000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:03.256753 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:15:03.270710 systemd[1]: Finished ignition-setup.service. Feb 12 19:15:03.308475 systemd-networkd[836]: enP41244s1: Link UP Feb 12 19:15:03.308555 systemd-networkd[836]: eth0: Link UP Feb 12 19:15:03.321022 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:15:03.326858 systemd-networkd[836]: eth0: Gained carrier Feb 12 19:15:03.363070 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:15:03.372783 systemd-networkd[836]: enP41244s1: Gained carrier Feb 12 19:15:03.408760 systemd-networkd[836]: eth0: DHCPv4 address 10.200.20.38/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:15:04.830582 systemd-networkd[836]: eth0: Gained IPv6LL Feb 12 19:15:06.876193 ignition[863]: Ignition 2.14.0 Feb 12 19:15:06.876204 ignition[863]: Stage: fetch-offline Feb 12 19:15:06.876256 ignition[863]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:06.876280 ignition[863]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:06.975393 ignition[863]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:06.975558 ignition[863]: parsed url from cmdline: "" Feb 12 19:15:06.975562 ignition[863]: no config URL provided Feb 12 19:15:06.975568 ignition[863]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:15:06.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.983305 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:15:07.027903 kernel: audit: type=1130 audit(1707765306.993:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:06.975577 ignition[863]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:15:07.020872 systemd[1]: Starting ignition-fetch.service... Feb 12 19:15:06.975582 ignition[863]: failed to fetch config: resource requires networking Feb 12 19:15:06.975685 ignition[863]: Ignition finished successfully Feb 12 19:15:07.032710 ignition[869]: Ignition 2.14.0 Feb 12 19:15:07.032716 ignition[869]: Stage: fetch Feb 12 19:15:07.032839 ignition[869]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:07.032857 ignition[869]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:07.040270 ignition[869]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:07.042594 ignition[869]: parsed url from cmdline: "" Feb 12 19:15:07.042599 ignition[869]: no config URL provided Feb 12 19:15:07.042608 ignition[869]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:15:07.042622 ignition[869]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:15:07.042654 ignition[869]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:15:07.071649 ignition[869]: GET result: OK Feb 12 19:15:07.121000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.112493 unknown[869]: fetched base config from "system" Feb 12 19:15:07.146828 kernel: audit: type=1130 audit(1707765307.121:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.071738 ignition[869]: config has been read from IMDS userdata Feb 12 19:15:07.112501 unknown[869]: fetched base config from "system" Feb 12 19:15:07.071805 ignition[869]: parsing config with SHA512: 67b10a86e01b6d3f6011c99697f94d98623ad974472f3a05e51f1757ea75d0518b09b4e79896d07a985fdf1592df55d93d0fdd05da1317beff7ebf2eaa949e88 Feb 12 19:15:07.112506 unknown[869]: fetched user config from "azure" Feb 12 19:15:07.113168 ignition[869]: fetch: fetch complete Feb 12 19:15:07.116925 systemd[1]: Finished ignition-fetch.service. Feb 12 19:15:07.209979 kernel: audit: type=1130 audit(1707765307.179:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.179000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.113173 ignition[869]: fetch: fetch passed Feb 12 19:15:07.152637 systemd[1]: Starting ignition-kargs.service... Feb 12 19:15:07.113220 ignition[869]: Ignition finished successfully Feb 12 19:15:07.174288 systemd[1]: Finished ignition-kargs.service. Feb 12 19:15:07.238000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.165414 ignition[875]: Ignition 2.14.0 Feb 12 19:15:07.271489 kernel: audit: type=1130 audit(1707765307.238:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.185056 systemd[1]: Starting ignition-disks.service... Feb 12 19:15:07.165420 ignition[875]: Stage: kargs Feb 12 19:15:07.232869 systemd[1]: Finished ignition-disks.service. Feb 12 19:15:07.165544 ignition[875]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:07.238739 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:15:07.165565 ignition[875]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:07.275879 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:15:07.168192 ignition[875]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:07.286955 systemd[1]: Reached target local-fs.target. Feb 12 19:15:07.171347 ignition[875]: kargs: kargs passed Feb 12 19:15:07.295742 systemd[1]: Reached target sysinit.target. Feb 12 19:15:07.171422 ignition[875]: Ignition finished successfully Feb 12 19:15:07.306168 systemd[1]: Reached target basic.target. Feb 12 19:15:07.218546 ignition[881]: Ignition 2.14.0 Feb 12 19:15:07.324072 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:15:07.218553 ignition[881]: Stage: disks Feb 12 19:15:07.218663 ignition[881]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:07.218680 ignition[881]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:07.226009 ignition[881]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:07.227365 ignition[881]: disks: disks passed Feb 12 19:15:07.227418 ignition[881]: Ignition finished successfully Feb 12 19:15:07.407870 systemd-fsck[889]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 12 19:15:07.402914 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:15:07.422000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:07.426265 systemd[1]: Mounting sysroot.mount... Feb 12 19:15:07.456482 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:15:07.457277 systemd[1]: Mounted sysroot.mount. Feb 12 19:15:07.462075 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:15:07.504300 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:15:07.510005 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:15:07.520042 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:15:07.520075 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:15:07.527730 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:15:07.569840 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:15:07.576999 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:15:07.609385 initrd-setup-root[905]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:15:07.628142 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (900) Feb 12 19:15:07.628163 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:15:07.634684 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:15:07.634719 initrd-setup-root[913]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:15:07.642549 initrd-setup-root[921]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:15:07.656338 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:15:07.656368 initrd-setup-root[929]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:15:07.668726 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:15:08.204363 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:15:08.246818 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:15:08.246841 kernel: audit: type=1130 audit(1707765308.209:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:08.209000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:08.210700 systemd[1]: Starting ignition-mount.service... Feb 12 19:15:08.243686 systemd[1]: Starting sysroot-boot.service... Feb 12 19:15:08.249010 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:15:08.249115 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:15:08.282989 ignition[967]: INFO : Ignition 2.14.0 Feb 12 19:15:08.288997 ignition[967]: INFO : Stage: mount Feb 12 19:15:08.288997 ignition[967]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:08.288997 ignition[967]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:08.288997 ignition[967]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:08.352461 kernel: audit: type=1130 audit(1707765308.307:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:08.307000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:08.299112 systemd[1]: Finished ignition-mount.service. Feb 12 19:15:08.356833 ignition[967]: INFO : mount: mount passed Feb 12 19:15:08.356833 ignition[967]: INFO : Ignition finished successfully Feb 12 19:15:08.393039 kernel: audit: type=1130 audit(1707765308.361:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:08.361000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:08.354075 systemd[1]: Finished sysroot-boot.service. Feb 12 19:15:08.890327 coreos-metadata[899]: Feb 12 19:15:08.890 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:15:08.901543 coreos-metadata[899]: Feb 12 19:15:08.901 INFO Fetch successful Feb 12 19:15:08.934060 coreos-metadata[899]: Feb 12 19:15:08.934 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:15:08.962399 coreos-metadata[899]: Feb 12 19:15:08.962 INFO Fetch successful Feb 12 19:15:08.971386 coreos-metadata[899]: Feb 12 19:15:08.969 INFO wrote hostname ci-3510.3.2-a-d216911d7c to /sysroot/etc/hostname Feb 12 19:15:08.981393 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:15:08.987000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:09.010223 systemd[1]: Starting ignition-files.service... Feb 12 19:15:09.019762 kernel: audit: type=1130 audit(1707765308.987:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:09.020655 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:15:09.048145 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (978) Feb 12 19:15:09.048202 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:15:09.048221 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:15:09.059596 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:15:09.064295 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:15:09.079896 ignition[997]: INFO : Ignition 2.14.0 Feb 12 19:15:09.079896 ignition[997]: INFO : Stage: files Feb 12 19:15:09.090299 ignition[997]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:09.090299 ignition[997]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:09.090299 ignition[997]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:09.090299 ignition[997]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:15:09.090299 ignition[997]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:15:09.090299 ignition[997]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:15:09.170412 ignition[997]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:15:09.180107 ignition[997]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:15:09.180107 ignition[997]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:15:09.179557 unknown[997]: wrote ssh authorized keys file for user: core Feb 12 19:15:09.203830 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:15:09.203830 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:15:09.629615 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:15:09.785059 ignition[997]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 12 19:15:09.805529 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:15:09.805529 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:15:09.805529 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 12 19:15:10.177905 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:15:10.509573 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:15:10.522810 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:15:10.522810 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 12 19:15:10.920193 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:15:11.174877 ignition[997]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 12 19:15:11.193344 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:15:11.193344 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:15:11.193344 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubectl: attempt #1 Feb 12 19:15:11.405129 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:15:11.729473 ignition[997]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 14be61ec35669a27acf2df0380afb85b9b42311d50ca1165718421c5f605df1119ec9ae314696a674051712e80deeaa65e62d2d62ed4d107fe99d0aaf419dafc Feb 12 19:15:11.746055 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:15:11.746055 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:15:11.746055 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:15:11.803657 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:15:13.827674 ignition[997]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 45b3100984c979ba0f1c0df8f4211474c2d75ebe916e677dff5fc8e3b3697cf7a953da94e356f39684cc860dff6878b772b7514c55651c2f866d9efeef23f970 Feb 12 19:15:13.848650 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:15:13.848650 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:15:13.848650 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.27.2/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:15:14.047341 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:15:26.247541 ignition[997]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 71857ff499ae135fa478e1827a0ed8865e578a8d2b1e25876e914fd0beba03733801c0654bcd4c0567bafeb16887dafb2dbbe8d1116e6ea28dcd8366c142d348 Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:15:26.265820 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:15:26.538396 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1001) Feb 12 19:15:26.538429 kernel: audit: type=1130 audit(1707765326.375:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.538448 kernel: audit: type=1130 audit(1707765326.445:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.538469 kernel: audit: type=1130 audit(1707765326.479:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.538480 kernel: audit: type=1131 audit(1707765326.479:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.445000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.479000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3111969192" Feb 12 19:15:26.538616 ignition[997]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3111969192": device or resource busy Feb 12 19:15:26.538616 ignition[997]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3111969192", trying btrfs: device or resource busy Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3111969192" Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3111969192" Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3111969192" Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3111969192" Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:15:26.538616 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem815043603" Feb 12 19:15:26.538616 ignition[997]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem815043603": device or resource busy Feb 12 19:15:26.818697 kernel: audit: type=1130 audit(1707765326.605:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.818726 kernel: audit: type=1131 audit(1707765326.639:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.818736 kernel: audit: type=1130 audit(1707765326.739:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.605000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.639000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.332416 systemd[1]: mnt-oem3111969192.mount: Deactivated successfully. Feb 12 19:15:26.829626 ignition[997]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem815043603", trying btrfs: device or resource busy Feb 12 19:15:26.829626 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem815043603" Feb 12 19:15:26.829626 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem815043603" Feb 12 19:15:26.829626 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem815043603" Feb 12 19:15:26.829626 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem815043603" Feb 12 19:15:26.829626 ignition[997]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(1b): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:15:26.829626 ignition[997]: INFO : files: op(1b): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:15:27.144847 kernel: audit: type=1131 audit(1707765326.872:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.144876 kernel: audit: type=1131 audit(1707765327.081:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.872000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.081000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.351255 systemd[1]: mnt-oem815043603.mount: Deactivated successfully. Feb 12 19:15:27.149000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(1d): [started] processing unit "prepare-critools.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(1d): [finished] processing unit "prepare-critools.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(1f): [started] setting preset to enabled for "waagent.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(1f): [finished] setting preset to enabled for "waagent.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(20): [started] setting preset to enabled for "nvidia.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(20): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(21): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(22): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(23): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:15:27.173366 ignition[997]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:15:27.173366 ignition[997]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:15:27.173366 ignition[997]: INFO : files: files passed Feb 12 19:15:27.173366 ignition[997]: INFO : Ignition finished successfully Feb 12 19:15:27.476491 kernel: audit: type=1131 audit(1707765327.149:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.208000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.306000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.342000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.360000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.379000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.395000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.362479 systemd[1]: Finished ignition-files.service. Feb 12 19:15:27.491534 initrd-setup-root-after-ignition[1022]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:15:26.376932 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:15:26.408951 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:15:27.521000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.421091 systemd[1]: Starting ignition-quench.service... Feb 12 19:15:26.431150 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:15:26.445664 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:15:27.564000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.445753 systemd[1]: Finished ignition-quench.service. Feb 12 19:15:27.575000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.480384 systemd[1]: Reached target ignition-complete.target. Feb 12 19:15:27.585000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.585000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:15:27.591582 ignition[1035]: INFO : Ignition 2.14.0 Feb 12 19:15:27.591582 ignition[1035]: INFO : Stage: umount Feb 12 19:15:27.591582 ignition[1035]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:15:27.591582 ignition[1035]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:15:27.591582 ignition[1035]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:15:27.591582 ignition[1035]: INFO : umount: umount passed Feb 12 19:15:27.591582 ignition[1035]: INFO : Ignition finished successfully Feb 12 19:15:27.607000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.623000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.637000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.658000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.541199 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:15:26.584517 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:15:27.714000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.584629 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:15:27.727000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.640160 systemd[1]: Reached target initrd-fs.target. Feb 12 19:15:27.754000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.767503 kernel: hv_netvsc 002248c1-8d18-0022-48c1-8d18002248c1 eth0: Data path switched from VF: enP41244s1 Feb 12 19:15:26.656799 systemd[1]: Reached target initrd.target. Feb 12 19:15:26.693618 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:15:27.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.705109 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:15:27.801000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.732132 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:15:27.813000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.788167 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:15:27.825000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:27.825000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.813331 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:15:26.823817 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:15:26.835226 systemd[1]: Stopped target timers.target. Feb 12 19:15:26.856042 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:15:26.856105 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:15:27.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:26.905062 systemd[1]: Stopped target initrd.target. Feb 12 19:15:26.921175 systemd[1]: Stopped target basic.target. Feb 12 19:15:26.937581 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:15:26.953259 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:15:26.968177 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:15:26.980386 systemd[1]: Stopped target remote-fs.target. Feb 12 19:15:26.991642 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:15:27.923542 systemd-journald[276]: Received SIGTERM from PID 1 (systemd). Feb 12 19:15:27.923574 iscsid[848]: iscsid shutting down. Feb 12 19:15:27.005812 systemd[1]: Stopped target sysinit.target. Feb 12 19:15:27.019064 systemd[1]: Stopped target local-fs.target. Feb 12 19:15:27.036379 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:15:27.054676 systemd[1]: Stopped target swap.target. Feb 12 19:15:27.067981 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:15:27.068047 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:15:27.115967 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:15:27.135593 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:15:27.135651 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:15:27.176031 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:15:27.176085 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:15:27.190330 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:15:27.190368 systemd[1]: Stopped ignition-files.service. Feb 12 19:15:27.208860 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:15:27.208896 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:15:27.237301 systemd[1]: Stopping ignition-mount.service... Feb 12 19:15:27.253880 systemd[1]: Stopping iscsiuio.service... Feb 12 19:15:27.260226 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:15:27.273961 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:15:27.274039 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:15:27.283602 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:15:27.283661 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:15:27.289947 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:15:27.290059 systemd[1]: Stopped iscsiuio.service. Feb 12 19:15:27.307099 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:15:27.307178 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:15:27.323002 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:15:27.323096 systemd[1]: Stopped ignition-mount.service. Feb 12 19:15:27.343380 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:15:27.343444 systemd[1]: Stopped ignition-disks.service. Feb 12 19:15:27.360776 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:15:27.360832 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:15:27.379703 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:15:27.379751 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:15:27.395508 systemd[1]: Stopped target network.target. Feb 12 19:15:27.413188 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:15:27.413244 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:15:27.430668 systemd[1]: Stopped target paths.target. Feb 12 19:15:27.447781 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:15:27.464053 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:15:27.470072 systemd[1]: Stopped target slices.target. Feb 12 19:15:27.481594 systemd[1]: Stopped target sockets.target. Feb 12 19:15:27.486596 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:15:27.486630 systemd[1]: Closed iscsid.socket. Feb 12 19:15:27.495692 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:15:27.495731 systemd[1]: Closed iscsiuio.socket. Feb 12 19:15:27.510452 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:15:27.510504 systemd[1]: Stopped ignition-setup.service. Feb 12 19:15:27.522278 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:15:27.541363 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:15:27.546478 systemd-networkd[836]: eth0: DHCPv6 lease lost Feb 12 19:15:27.924000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:15:27.553829 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:15:27.554450 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:15:27.554571 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:15:27.565703 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:15:27.565812 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:15:27.576746 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:15:27.576834 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:15:27.586035 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:15:27.586073 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:15:27.597146 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:15:27.597193 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:15:27.608084 systemd[1]: Stopping network-cleanup.service... Feb 12 19:15:27.616951 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:15:27.617016 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:15:27.623537 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:15:27.623610 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:15:27.653398 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:15:27.653464 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:15:27.659537 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:15:27.673927 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:15:27.674436 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:15:27.674593 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:15:27.684141 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:15:27.684203 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:15:27.695467 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:15:27.695506 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:15:27.703272 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:15:27.703356 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:15:27.715054 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:15:27.715103 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:15:27.728141 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:15:27.728187 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:15:27.755943 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:15:27.773768 systemd[1]: systemd-tmpfiles-setup-dev.service: Deactivated successfully. Feb 12 19:15:27.773857 systemd[1]: Stopped systemd-tmpfiles-setup-dev.service. Feb 12 19:15:27.795242 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:15:27.795305 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:15:27.801490 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:15:27.801537 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:15:27.815011 systemd[1]: run-credentials-systemd\x2dtmpfiles\x2dsetup\x2ddev.service.mount: Deactivated successfully. Feb 12 19:15:27.815636 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:15:27.815741 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:15:27.847625 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:15:27.847734 systemd[1]: Stopped network-cleanup.service. Feb 12 19:15:27.859424 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:15:27.871164 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:15:27.891961 systemd[1]: Switching root. Feb 12 19:15:27.926030 systemd-journald[276]: Journal stopped Feb 12 19:15:39.936404 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:15:39.936424 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:15:39.936434 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:15:39.936445 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:15:39.936489 kernel: SELinux: policy capability open_perms=1 Feb 12 19:15:39.936503 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:15:39.936512 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:15:39.936520 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:15:39.936528 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:15:39.936536 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:15:39.936545 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:15:39.936555 systemd[1]: Successfully loaded SELinux policy in 321.012ms. Feb 12 19:15:39.936565 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 24.159ms. Feb 12 19:15:39.936575 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:15:39.936586 systemd[1]: Detected virtualization microsoft. Feb 12 19:15:39.936596 systemd[1]: Detected architecture arm64. Feb 12 19:15:39.936604 systemd[1]: Detected first boot. Feb 12 19:15:39.936614 systemd[1]: Hostname set to . Feb 12 19:15:39.936622 systemd[1]: Initializing machine ID from random generator. Feb 12 19:15:39.936631 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:15:39.936639 kernel: kauditd_printk_skb: 40 callbacks suppressed Feb 12 19:15:39.936649 kernel: audit: type=1400 audit(1707765332.327:88): avc: denied { associate } for pid=1068 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:15:39.936661 kernel: audit: type=1300 audit(1707765332.327:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1051 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:39.936670 kernel: audit: type=1327 audit(1707765332.327:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:15:39.936679 kernel: audit: type=1400 audit(1707765332.336:89): avc: denied { associate } for pid=1068 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:15:39.936689 kernel: audit: type=1300 audit(1707765332.336:89): arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1051 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:39.936698 kernel: audit: type=1307 audit(1707765332.336:89): cwd="/" Feb 12 19:15:39.936708 kernel: audit: type=1302 audit(1707765332.336:89): item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:39.936717 kernel: audit: type=1302 audit(1707765332.336:89): item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:39.936727 kernel: audit: type=1327 audit(1707765332.336:89): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:15:39.936736 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:15:39.936745 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:15:39.936754 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:15:39.936765 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:15:39.936775 kernel: audit: type=1334 audit(1707765339.187:90): prog-id=12 op=LOAD Feb 12 19:15:39.936784 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:15:39.936793 kernel: audit: type=1334 audit(1707765339.187:91): prog-id=3 op=UNLOAD Feb 12 19:15:39.936801 systemd[1]: Stopped iscsid.service. Feb 12 19:15:39.936811 kernel: audit: type=1334 audit(1707765339.187:92): prog-id=13 op=LOAD Feb 12 19:15:39.936819 kernel: audit: type=1334 audit(1707765339.187:93): prog-id=14 op=LOAD Feb 12 19:15:39.936830 kernel: audit: type=1334 audit(1707765339.187:94): prog-id=4 op=UNLOAD Feb 12 19:15:39.936841 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:15:39.936850 kernel: audit: type=1334 audit(1707765339.187:95): prog-id=5 op=UNLOAD Feb 12 19:15:39.936858 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:15:39.936867 kernel: audit: type=1334 audit(1707765339.187:96): prog-id=15 op=LOAD Feb 12 19:15:39.936876 kernel: audit: type=1334 audit(1707765339.187:97): prog-id=12 op=UNLOAD Feb 12 19:15:39.936885 kernel: audit: type=1334 audit(1707765339.187:98): prog-id=16 op=LOAD Feb 12 19:15:39.936895 kernel: audit: type=1334 audit(1707765339.187:99): prog-id=17 op=LOAD Feb 12 19:15:39.936904 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:15:39.936914 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:15:39.936924 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:15:39.936933 systemd[1]: Created slice system-getty.slice. Feb 12 19:15:39.936943 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:15:39.936952 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:15:39.936961 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:15:39.936971 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:15:39.936980 systemd[1]: Created slice user.slice. Feb 12 19:15:39.936990 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:15:39.937000 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:15:39.937009 systemd[1]: Set up automount boot.automount. Feb 12 19:15:39.937019 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:15:39.937028 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:15:39.937037 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:15:39.937046 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:15:39.937056 systemd[1]: Reached target integritysetup.target. Feb 12 19:15:39.937065 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:15:39.937076 systemd[1]: Reached target remote-fs.target. Feb 12 19:15:39.937085 systemd[1]: Reached target slices.target. Feb 12 19:15:39.937095 systemd[1]: Reached target swap.target. Feb 12 19:15:39.937104 systemd[1]: Reached target torcx.target. Feb 12 19:15:39.937114 systemd[1]: Reached target veritysetup.target. Feb 12 19:15:39.937123 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:15:39.937134 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:15:39.937143 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:15:39.937152 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:15:39.937162 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:15:39.937171 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:15:39.937181 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:15:39.937190 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:15:39.937199 systemd[1]: Mounting media.mount... Feb 12 19:15:39.937210 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:15:39.937219 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:15:39.937228 systemd[1]: Mounting tmp.mount... Feb 12 19:15:39.937238 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:15:39.937247 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:15:39.937257 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:15:39.937266 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:15:39.937276 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:15:39.937285 systemd[1]: Starting modprobe@drm.service... Feb 12 19:15:39.937296 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:15:39.937306 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:15:39.937315 systemd[1]: Starting modprobe@loop.service... Feb 12 19:15:39.937325 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:15:39.937334 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:15:39.937343 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:15:39.937353 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:15:39.937362 kernel: loop: module loaded Feb 12 19:15:39.937372 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:15:39.937381 kernel: fuse: init (API version 7.34) Feb 12 19:15:39.937390 systemd[1]: Stopped systemd-journald.service. Feb 12 19:15:39.937400 systemd[1]: systemd-journald.service: Consumed 3.659s CPU time. Feb 12 19:15:39.937409 systemd[1]: Starting systemd-journald.service... Feb 12 19:15:39.937418 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:15:39.937428 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:15:39.937437 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:15:39.937446 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:15:39.937466 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:15:39.937476 systemd[1]: Stopped verity-setup.service. Feb 12 19:15:39.937485 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:15:39.937494 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:15:39.937507 systemd-journald[1174]: Journal started Feb 12 19:15:39.937549 systemd-journald[1174]: Runtime Journal (/run/log/journal/cbd2fba2b1a348caa27d44ef890b3bf6) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:15:30.299000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:15:31.052000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:15:31.052000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:15:31.053000 audit: BPF prog-id=10 op=LOAD Feb 12 19:15:31.053000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:15:31.053000 audit: BPF prog-id=11 op=LOAD Feb 12 19:15:31.053000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:15:32.327000 audit[1068]: AVC avc: denied { associate } for pid=1068 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:15:32.327000 audit[1068]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1051 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:32.327000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:15:32.336000 audit[1068]: AVC avc: denied { associate } for pid=1068 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:15:32.336000 audit[1068]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1051 pid=1068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:32.336000 audit: CWD cwd="/" Feb 12 19:15:32.336000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:32.336000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:32.336000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:15:39.187000 audit: BPF prog-id=12 op=LOAD Feb 12 19:15:39.187000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:15:39.187000 audit: BPF prog-id=13 op=LOAD Feb 12 19:15:39.187000 audit: BPF prog-id=14 op=LOAD Feb 12 19:15:39.187000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:15:39.187000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:15:39.187000 audit: BPF prog-id=15 op=LOAD Feb 12 19:15:39.187000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:15:39.187000 audit: BPF prog-id=16 op=LOAD Feb 12 19:15:39.187000 audit: BPF prog-id=17 op=LOAD Feb 12 19:15:39.187000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:15:39.187000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:15:39.188000 audit: BPF prog-id=18 op=LOAD Feb 12 19:15:39.188000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:15:39.188000 audit: BPF prog-id=19 op=LOAD Feb 12 19:15:39.188000 audit: BPF prog-id=20 op=LOAD Feb 12 19:15:39.188000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:15:39.188000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:15:39.190000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.228000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:15:39.228000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.283000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.815000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.838000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.847000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.853000 audit: BPF prog-id=21 op=LOAD Feb 12 19:15:39.853000 audit: BPF prog-id=22 op=LOAD Feb 12 19:15:39.853000 audit: BPF prog-id=23 op=LOAD Feb 12 19:15:39.853000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:15:39.853000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:15:39.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.931000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:15:39.931000 audit[1174]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=3 a1=ffffcdbe08f0 a2=4000 a3=1 items=0 ppid=1 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:39.931000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:15:32.296820 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:15:39.185502 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:15:32.297084 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:15:39.189045 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:15:32.297102 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:15:39.190744 systemd[1]: systemd-journald.service: Consumed 3.659s CPU time. Feb 12 19:15:32.297139 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:15:32.297149 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:15:32.297176 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:15:32.297187 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:15:32.297378 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:15:32.297408 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:15:32.297420 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:15:32.312239 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:15:32.312276 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:15:32.312295 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:15:32.312309 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:15:32.312327 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:15:32.312341 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:32Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:15:38.178176 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:38Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:15:38.178435 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:38Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:15:38.178539 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:38Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:15:38.178692 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:38Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:15:38.178739 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:38Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:15:38.178793 /usr/lib/systemd/system-generators/torcx-generator[1068]: time="2024-02-12T19:15:38Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:15:39.950969 systemd[1]: Started systemd-journald.service. Feb 12 19:15:39.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.951803 systemd[1]: Mounted media.mount. Feb 12 19:15:39.956824 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:15:39.961739 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:15:39.966377 systemd[1]: Mounted tmp.mount. Feb 12 19:15:39.970512 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:15:39.974000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.975545 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:15:39.979000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.980358 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:15:39.980628 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:15:39.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.985737 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:15:39.985869 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:15:39.990000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.990000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.991183 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:15:39.991302 systemd[1]: Finished modprobe@drm.service. Feb 12 19:15:39.996000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.996000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:39.996645 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:15:39.996765 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:15:40.002000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.002000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.003003 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:15:40.003124 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:15:40.007000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.007000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.008335 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:15:40.008470 systemd[1]: Finished modprobe@loop.service. Feb 12 19:15:40.012000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.012000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.013559 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:15:40.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.019820 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:15:40.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.026698 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:15:40.031000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.032555 systemd[1]: Reached target network-pre.target. Feb 12 19:15:40.039271 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:15:40.045258 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:15:40.050617 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:15:40.071783 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:15:40.077881 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:15:40.083347 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:15:40.084442 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:15:40.089127 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:15:40.090162 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:15:40.095807 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:15:40.103960 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:15:40.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.109956 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:15:40.117337 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:15:40.123896 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:15:40.136737 udevadm[1188]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:15:40.147310 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:15:40.153000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.153484 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:15:40.161524 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:15:40.166000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.167852 systemd-journald[1174]: Time spent on flushing to /var/log/journal/cbd2fba2b1a348caa27d44ef890b3bf6 is 13.975ms for 1149 entries. Feb 12 19:15:40.167852 systemd-journald[1174]: System Journal (/var/log/journal/cbd2fba2b1a348caa27d44ef890b3bf6) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:15:40.260195 systemd-journald[1174]: Received client request to flush runtime journal. Feb 12 19:15:40.261198 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:15:40.266000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.760183 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:15:40.765000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:40.767402 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:15:41.077975 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:15:41.083000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:41.309988 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:15:41.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:41.316000 audit: BPF prog-id=24 op=LOAD Feb 12 19:15:41.316000 audit: BPF prog-id=25 op=LOAD Feb 12 19:15:41.316000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:15:41.316000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:15:41.317820 systemd[1]: Starting systemd-udevd.service... Feb 12 19:15:41.336528 systemd-udevd[1193]: Using default interface naming scheme 'v252'. Feb 12 19:15:41.507798 systemd[1]: Started systemd-udevd.service. Feb 12 19:15:41.517000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:41.518000 audit: BPF prog-id=26 op=LOAD Feb 12 19:15:41.520665 systemd[1]: Starting systemd-networkd.service... Feb 12 19:15:41.549307 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:15:41.614118 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:15:41.612000 audit: BPF prog-id=27 op=LOAD Feb 12 19:15:41.612000 audit: BPF prog-id=28 op=LOAD Feb 12 19:15:41.612000 audit: BPF prog-id=29 op=LOAD Feb 12 19:15:41.640542 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:15:41.640814 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:15:41.655534 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:15:41.655602 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:15:41.655622 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:15:41.655639 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:15:41.330000 audit[1208]: AVC avc: denied { confidentiality } for pid=1208 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:15:41.462458 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:15:41.462490 systemd-journald[1174]: Time jumped backwards, rotating. Feb 12 19:15:41.462553 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:15:41.462566 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:15:41.462578 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:15:41.462590 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 12 19:15:41.462605 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:15:41.462618 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:15:41.462633 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:15:41.330000 audit[1208]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaacdd3bcd0 a1=aa2c a2=ffff846424b0 a3=aaaacdc96010 items=12 ppid=1193 pid=1208 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:41.330000 audit: CWD cwd="/" Feb 12 19:15:41.330000 audit: PATH item=0 name=(null) inode=6322 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=1 name=(null) inode=10950 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=2 name=(null) inode=10950 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=3 name=(null) inode=10951 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=4 name=(null) inode=10950 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=5 name=(null) inode=10952 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=6 name=(null) inode=10950 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=7 name=(null) inode=10953 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=8 name=(null) inode=10950 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=9 name=(null) inode=10954 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=10 name=(null) inode=10950 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PATH item=11 name=(null) inode=10955 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:15:41.330000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:15:41.405000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:41.398161 systemd[1]: Started systemd-userdbd.service. Feb 12 19:15:41.670532 systemd-networkd[1214]: lo: Link UP Feb 12 19:15:41.670545 systemd-networkd[1214]: lo: Gained carrier Feb 12 19:15:41.671077 systemd-networkd[1214]: Enumeration completed Feb 12 19:15:41.671177 systemd[1]: Started systemd-networkd.service. Feb 12 19:15:41.675000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:41.677606 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:15:41.703934 systemd-networkd[1214]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:15:41.706766 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1210) Feb 12 19:15:41.730519 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:15:41.736560 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:15:41.740000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:41.743310 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:15:41.755768 kernel: mlx5_core a11c:00:02.0 enP41244s1: Link up Feb 12 19:15:41.784663 systemd-networkd[1214]: enP41244s1: Link UP Feb 12 19:15:41.784837 kernel: hv_netvsc 002248c1-8d18-0022-48c1-8d18002248c1 eth0: Data path switched to VF: enP41244s1 Feb 12 19:15:41.785131 systemd-networkd[1214]: eth0: Link UP Feb 12 19:15:41.785241 systemd-networkd[1214]: eth0: Gained carrier Feb 12 19:15:41.794085 systemd-networkd[1214]: enP41244s1: Gained carrier Feb 12 19:15:41.811907 systemd-networkd[1214]: eth0: DHCPv4 address 10.200.20.38/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:15:42.063277 lvm[1272]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:15:42.103663 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:15:42.107000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:42.109159 systemd[1]: Reached target cryptsetup.target. Feb 12 19:15:42.116382 systemd[1]: Starting lvm2-activation.service... Feb 12 19:15:42.120369 lvm[1273]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:15:42.140715 systemd[1]: Finished lvm2-activation.service. Feb 12 19:15:42.144000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:42.146028 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:15:42.151472 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:15:42.151499 systemd[1]: Reached target local-fs.target. Feb 12 19:15:42.156592 systemd[1]: Reached target machines.target. Feb 12 19:15:42.163577 systemd[1]: Starting ldconfig.service... Feb 12 19:15:42.168520 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:15:42.168588 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:15:42.169942 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:15:42.176029 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:15:42.184220 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:15:42.189245 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:15:42.189307 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:15:42.190464 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:15:42.204777 systemd-tmpfiles[1278]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:15:42.221769 systemd-tmpfiles[1278]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:15:42.226353 systemd-tmpfiles[1278]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:15:42.236015 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1275 (bootctl) Feb 12 19:15:42.237246 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:15:42.572000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:42.566779 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:15:42.964930 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:15:42.965509 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:15:42.971000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:42.991752 systemd-fsck[1283]: fsck.fat 4.2 (2021-01-31) Feb 12 19:15:42.991752 systemd-fsck[1283]: /dev/sda1: 236 files, 113719/258078 clusters Feb 12 19:15:42.994091 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:15:42.999000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:43.002228 systemd[1]: Mounting boot.mount... Feb 12 19:15:43.014271 systemd[1]: Mounted boot.mount. Feb 12 19:15:43.026161 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:15:43.029000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:43.216868 systemd-networkd[1214]: eth0: Gained IPv6LL Feb 12 19:15:43.219661 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:15:43.223000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.296021 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:15:44.302000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.305673 systemd[1]: Starting audit-rules.service... Feb 12 19:15:44.308715 kernel: kauditd_printk_skb: 86 callbacks suppressed Feb 12 19:15:44.308776 kernel: audit: type=1130 audit(1707765344.302:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.332120 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:15:44.338239 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:15:44.342000 audit: BPF prog-id=30 op=LOAD Feb 12 19:15:44.345882 systemd[1]: Starting systemd-resolved.service... Feb 12 19:15:44.354117 kernel: audit: type=1334 audit(1707765344.342:170): prog-id=30 op=LOAD Feb 12 19:15:44.353000 audit: BPF prog-id=31 op=LOAD Feb 12 19:15:44.356502 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:15:44.365805 kernel: audit: type=1334 audit(1707765344.353:171): prog-id=31 op=LOAD Feb 12 19:15:44.369540 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:15:44.407000 audit[1295]: SYSTEM_BOOT pid=1295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.432750 kernel: audit: type=1127 audit(1707765344.407:172): pid=1295 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.435246 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:15:44.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.469765 kernel: audit: type=1130 audit(1707765344.441:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.520607 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:15:44.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.526119 systemd[1]: Reached target time-set.target. Feb 12 19:15:44.549010 kernel: audit: type=1130 audit(1707765344.524:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.549879 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:15:44.556000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.558136 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:15:44.582750 kernel: audit: type=1130 audit(1707765344.556:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.598868 systemd-resolved[1292]: Positive Trust Anchors: Feb 12 19:15:44.598885 systemd-resolved[1292]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:15:44.598912 systemd-resolved[1292]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:15:44.644869 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:15:44.651257 systemd-resolved[1292]: Using system hostname 'ci-3510.3.2-a-d216911d7c'. Feb 12 19:15:44.649000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.653955 systemd[1]: Started systemd-resolved.service. Feb 12 19:15:44.675152 kernel: audit: type=1130 audit(1707765344.649:176): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.674000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.676019 systemd[1]: Reached target network.target. Feb 12 19:15:44.698432 kernel: audit: type=1130 audit(1707765344.674:177): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:15:44.698962 systemd[1]: Reached target network-online.target. Feb 12 19:15:44.706904 systemd[1]: Reached target nss-lookup.target. Feb 12 19:15:44.822411 augenrules[1310]: No rules Feb 12 19:15:44.820000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:15:44.827521 systemd[1]: Finished audit-rules.service. Feb 12 19:15:44.839523 kernel: audit: type=1305 audit(1707765344.820:178): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:15:44.820000 audit[1310]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffe841f350 a2=420 a3=0 items=0 ppid=1289 pid=1310 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:15:44.820000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:15:44.896263 systemd-timesyncd[1293]: Contacted time server 72.46.53.234:123 (0.flatcar.pool.ntp.org). Feb 12 19:15:44.896339 systemd-timesyncd[1293]: Initial clock synchronization to Mon 2024-02-12 19:15:44.891482 UTC. Feb 12 19:15:50.418780 ldconfig[1274]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:15:50.434392 systemd[1]: Finished ldconfig.service. Feb 12 19:15:50.440955 systemd[1]: Starting systemd-update-done.service... Feb 12 19:15:50.497783 systemd[1]: Finished systemd-update-done.service. Feb 12 19:15:50.503009 systemd[1]: Reached target sysinit.target. Feb 12 19:15:50.507848 systemd[1]: Started motdgen.path. Feb 12 19:15:50.511764 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:15:50.518282 systemd[1]: Started logrotate.timer. Feb 12 19:15:50.522583 systemd[1]: Started mdadm.timer. Feb 12 19:15:50.526715 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:15:50.531995 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:15:50.532028 systemd[1]: Reached target paths.target. Feb 12 19:15:50.536498 systemd[1]: Reached target timers.target. Feb 12 19:15:50.541756 systemd[1]: Listening on dbus.socket. Feb 12 19:15:50.547110 systemd[1]: Starting docker.socket... Feb 12 19:15:50.553588 systemd[1]: Listening on sshd.socket. Feb 12 19:15:50.558282 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:15:50.558776 systemd[1]: Listening on docker.socket. Feb 12 19:15:50.564425 systemd[1]: Reached target sockets.target. Feb 12 19:15:50.569855 systemd[1]: Reached target basic.target. Feb 12 19:15:50.575107 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:15:50.575135 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:15:50.576246 systemd[1]: Starting containerd.service... Feb 12 19:15:50.582150 systemd[1]: Starting dbus.service... Feb 12 19:15:50.587396 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:15:50.594040 systemd[1]: Starting extend-filesystems.service... Feb 12 19:15:50.599473 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:15:50.600631 systemd[1]: Starting motdgen.service... Feb 12 19:15:50.606261 systemd[1]: Started nvidia.service. Feb 12 19:15:50.612010 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:15:50.620196 systemd[1]: Starting prepare-critools.service... Feb 12 19:15:50.626947 systemd[1]: Starting prepare-helm.service... Feb 12 19:15:50.632519 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:15:50.638960 systemd[1]: Starting sshd-keygen.service... Feb 12 19:15:50.645854 systemd[1]: Starting systemd-logind.service... Feb 12 19:15:50.651143 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:15:50.651206 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:15:50.651632 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:15:50.652384 systemd[1]: Starting update-engine.service... Feb 12 19:15:50.658749 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:15:50.670968 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:15:50.671142 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:15:50.690660 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:15:50.690857 systemd[1]: Finished motdgen.service. Feb 12 19:15:50.700350 extend-filesystems[1321]: Found sda Feb 12 19:15:50.706130 extend-filesystems[1321]: Found sda1 Feb 12 19:15:50.706130 extend-filesystems[1321]: Found sda2 Feb 12 19:15:50.706130 extend-filesystems[1321]: Found sda3 Feb 12 19:15:50.706130 extend-filesystems[1321]: Found usr Feb 12 19:15:50.706130 extend-filesystems[1321]: Found sda4 Feb 12 19:15:50.706130 extend-filesystems[1321]: Found sda6 Feb 12 19:15:50.706130 extend-filesystems[1321]: Found sda7 Feb 12 19:15:50.706130 extend-filesystems[1321]: Found sda9 Feb 12 19:15:50.706130 extend-filesystems[1321]: Checking size of /dev/sda9 Feb 12 19:15:50.748834 systemd-logind[1334]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 12 19:15:50.771406 env[1346]: time="2024-02-12T19:15:50.749234581Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:15:50.750837 systemd-logind[1334]: New seat seat0. Feb 12 19:15:50.783229 tar[1342]: ./ Feb 12 19:15:50.783229 tar[1342]: ./loopback Feb 12 19:15:50.783785 extend-filesystems[1321]: Old size kept for /dev/sda9 Feb 12 19:15:50.783785 extend-filesystems[1321]: Found sr0 Feb 12 19:15:50.812900 tar[1343]: crictl Feb 12 19:15:50.813095 jq[1340]: true Feb 12 19:15:50.813225 jq[1320]: false Feb 12 19:15:50.791053 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:15:50.813383 tar[1344]: linux-arm64/helm Feb 12 19:15:50.791211 systemd[1]: Finished extend-filesystems.service. Feb 12 19:15:50.814311 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:15:50.814468 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:15:50.848761 jq[1381]: true Feb 12 19:15:50.882879 env[1346]: time="2024-02-12T19:15:50.882810820Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:15:50.882992 env[1346]: time="2024-02-12T19:15:50.882968466Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:50.885788 env[1346]: time="2024-02-12T19:15:50.885741321Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:15:50.885788 env[1346]: time="2024-02-12T19:15:50.885778953Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:50.886028 env[1346]: time="2024-02-12T19:15:50.885998707Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:15:50.886028 env[1346]: time="2024-02-12T19:15:50.886021822Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:50.886091 env[1346]: time="2024-02-12T19:15:50.886035339Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:15:50.886091 env[1346]: time="2024-02-12T19:15:50.886045057Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:50.886126 env[1346]: time="2024-02-12T19:15:50.886116082Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:50.886377 env[1346]: time="2024-02-12T19:15:50.886337475Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:15:50.886486 env[1346]: time="2024-02-12T19:15:50.886460089Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:15:50.886486 env[1346]: time="2024-02-12T19:15:50.886480045Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:15:50.886542 env[1346]: time="2024-02-12T19:15:50.886532994Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:15:50.886576 env[1346]: time="2024-02-12T19:15:50.886544271Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:15:50.900089 tar[1342]: ./bandwidth Feb 12 19:15:50.911386 env[1346]: time="2024-02-12T19:15:50.911324000Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:15:50.911512 env[1346]: time="2024-02-12T19:15:50.911412261Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:15:50.911512 env[1346]: time="2024-02-12T19:15:50.911429018Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:15:50.911512 env[1346]: time="2024-02-12T19:15:50.911472688Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:15:50.911512 env[1346]: time="2024-02-12T19:15:50.911487685Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:15:50.911512 env[1346]: time="2024-02-12T19:15:50.911502042Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:15:50.911615 env[1346]: time="2024-02-12T19:15:50.911516079Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:15:50.911955 env[1346]: time="2024-02-12T19:15:50.911917355Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:15:50.911955 env[1346]: time="2024-02-12T19:15:50.911945109Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:15:50.912038 env[1346]: time="2024-02-12T19:15:50.911967304Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:15:50.912038 env[1346]: time="2024-02-12T19:15:50.911982181Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:15:50.912038 env[1346]: time="2024-02-12T19:15:50.911996258Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:15:50.912253 env[1346]: time="2024-02-12T19:15:50.912150905Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:15:50.912253 env[1346]: time="2024-02-12T19:15:50.912247325Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:15:50.912543 env[1346]: time="2024-02-12T19:15:50.912519427Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:15:50.912584 env[1346]: time="2024-02-12T19:15:50.912551221Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912584 env[1346]: time="2024-02-12T19:15:50.912568017Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:15:50.912691 env[1346]: time="2024-02-12T19:15:50.912625645Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912691 env[1346]: time="2024-02-12T19:15:50.912643921Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912691 env[1346]: time="2024-02-12T19:15:50.912657198Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912691 env[1346]: time="2024-02-12T19:15:50.912678914Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912691 env[1346]: time="2024-02-12T19:15:50.912691111Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912822 env[1346]: time="2024-02-12T19:15:50.912704748Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912822 env[1346]: time="2024-02-12T19:15:50.912716266Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912822 env[1346]: time="2024-02-12T19:15:50.912742580Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912822 env[1346]: time="2024-02-12T19:15:50.912758577Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:15:50.912923 env[1346]: time="2024-02-12T19:15:50.912900947Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912955 env[1346]: time="2024-02-12T19:15:50.912923782Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912955 env[1346]: time="2024-02-12T19:15:50.912936659Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.912955 env[1346]: time="2024-02-12T19:15:50.912948737Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:15:50.913012 env[1346]: time="2024-02-12T19:15:50.912962734Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:15:50.913012 env[1346]: time="2024-02-12T19:15:50.912984449Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:15:50.913012 env[1346]: time="2024-02-12T19:15:50.913001606Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:15:50.913105 env[1346]: time="2024-02-12T19:15:50.913035319Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:15:50.913312 env[1346]: time="2024-02-12T19:15:50.913248274Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.913317619Z" level=info msg="Connect containerd service" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.913361650Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.913990237Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.914072220Z" level=info msg="Start subscribing containerd event" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.914113011Z" level=info msg="Start recovering state" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.914177077Z" level=info msg="Start event monitor" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.914193554Z" level=info msg="Start snapshots syncer" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.914202712Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.914218269Z" level=info msg="Start streaming server" Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.914543240Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.914595269Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:15:50.932397 env[1346]: time="2024-02-12T19:15:50.914659176Z" level=info msg="containerd successfully booted in 0.172594s" Feb 12 19:15:50.914756 systemd[1]: Started containerd.service. Feb 12 19:15:50.991960 bash[1397]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:15:50.993232 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:15:51.000772 dbus-daemon[1319]: [system] SELinux support is enabled Feb 12 19:15:51.002243 systemd[1]: Started dbus.service. Feb 12 19:15:51.013405 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:15:51.014086 dbus-daemon[1319]: [system] Successfully activated service 'org.freedesktop.systemd1' Feb 12 19:15:51.013447 systemd[1]: Reached target system-config.target. Feb 12 19:15:51.023255 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:15:51.023275 systemd[1]: Reached target user-config.target. Feb 12 19:15:51.034249 systemd[1]: Started systemd-logind.service. Feb 12 19:15:51.040241 tar[1342]: ./ptp Feb 12 19:15:51.056659 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:15:51.108492 tar[1342]: ./vlan Feb 12 19:15:51.145848 tar[1342]: ./host-device Feb 12 19:15:51.182164 tar[1342]: ./tuning Feb 12 19:15:51.215045 tar[1342]: ./vrf Feb 12 19:15:51.248757 tar[1342]: ./sbr Feb 12 19:15:51.281257 tar[1342]: ./tap Feb 12 19:15:51.319654 tar[1342]: ./dhcp Feb 12 19:15:51.489006 tar[1342]: ./static Feb 12 19:15:51.496953 update_engine[1336]: I0212 19:15:51.483232 1336 main.cc:92] Flatcar Update Engine starting Feb 12 19:15:51.539675 tar[1342]: ./firewall Feb 12 19:15:51.544088 systemd[1]: Started update-engine.service. Feb 12 19:15:51.554067 systemd[1]: Started locksmithd.service. Feb 12 19:15:51.559980 update_engine[1336]: I0212 19:15:51.551471 1336 update_check_scheduler.cc:74] Next update check in 6m33s Feb 12 19:15:51.634453 tar[1342]: ./macvlan Feb 12 19:15:51.709891 tar[1344]: linux-arm64/LICENSE Feb 12 19:15:51.710104 tar[1344]: linux-arm64/README.md Feb 12 19:15:51.714915 systemd[1]: Finished prepare-helm.service. Feb 12 19:15:51.731083 tar[1342]: ./dummy Feb 12 19:15:51.794089 tar[1342]: ./bridge Feb 12 19:15:51.822481 systemd[1]: Finished prepare-critools.service. Feb 12 19:15:51.843094 tar[1342]: ./ipvlan Feb 12 19:15:51.876227 tar[1342]: ./portmap Feb 12 19:15:51.908105 tar[1342]: ./host-local Feb 12 19:15:52.033368 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:15:52.837239 sshd_keygen[1338]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:15:52.854374 systemd[1]: Finished sshd-keygen.service. Feb 12 19:15:52.860532 systemd[1]: Starting issuegen.service... Feb 12 19:15:52.865473 systemd[1]: Started waagent.service. Feb 12 19:15:52.870302 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:15:52.870513 systemd[1]: Finished issuegen.service. Feb 12 19:15:52.876809 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:15:52.886914 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:15:52.896009 systemd[1]: Started getty@tty1.service. Feb 12 19:15:52.901685 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:15:52.907190 systemd[1]: Reached target getty.target. Feb 12 19:15:52.911755 systemd[1]: Reached target multi-user.target. Feb 12 19:15:52.917823 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:15:52.933851 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:15:52.934026 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:15:52.939997 systemd[1]: Startup finished in 756ms (kernel) + 31.165s (initrd) + 23.464s (userspace) = 55.386s. Feb 12 19:15:53.415909 locksmithd[1427]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:15:53.555319 login[1450]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 19:15:53.555977 login[1449]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:15:53.595375 systemd[1]: Created slice user-500.slice. Feb 12 19:15:53.596517 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:15:53.598588 systemd-logind[1334]: New session 2 of user core. Feb 12 19:15:53.633288 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:15:53.634854 systemd[1]: Starting user@500.service... Feb 12 19:15:53.651720 (systemd)[1453]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:15:53.844166 systemd[1453]: Queued start job for default target default.target. Feb 12 19:15:53.844661 systemd[1453]: Reached target paths.target. Feb 12 19:15:53.844679 systemd[1453]: Reached target sockets.target. Feb 12 19:15:53.844690 systemd[1453]: Reached target timers.target. Feb 12 19:15:53.844700 systemd[1453]: Reached target basic.target. Feb 12 19:15:53.844818 systemd[1]: Started user@500.service. Feb 12 19:15:53.845636 systemd[1]: Started session-2.scope. Feb 12 19:15:53.846111 systemd[1453]: Reached target default.target. Feb 12 19:15:53.846289 systemd[1453]: Startup finished in 188ms. Feb 12 19:15:54.556713 login[1450]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:15:54.560423 systemd-logind[1334]: New session 1 of user core. Feb 12 19:15:54.560859 systemd[1]: Started session-1.scope. Feb 12 19:16:00.145637 waagent[1447]: 2024-02-12T19:16:00.145532Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:16:00.153802 waagent[1447]: 2024-02-12T19:16:00.153693Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:16:00.159466 waagent[1447]: 2024-02-12T19:16:00.159382Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:16:00.165942 waagent[1447]: 2024-02-12T19:16:00.165840Z INFO Daemon Daemon Run daemon Feb 12 19:16:00.171336 waagent[1447]: 2024-02-12T19:16:00.171258Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:16:00.189942 waagent[1447]: 2024-02-12T19:16:00.189786Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:16:00.206545 waagent[1447]: 2024-02-12T19:16:00.206401Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:16:00.217768 waagent[1447]: 2024-02-12T19:16:00.217664Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:16:00.224287 waagent[1447]: 2024-02-12T19:16:00.224203Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:16:00.231235 waagent[1447]: 2024-02-12T19:16:00.231161Z INFO Daemon Daemon Activate resource disk Feb 12 19:16:00.236346 waagent[1447]: 2024-02-12T19:16:00.236276Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:16:00.251271 waagent[1447]: 2024-02-12T19:16:00.251191Z INFO Daemon Daemon Found device: None Feb 12 19:16:00.256535 waagent[1447]: 2024-02-12T19:16:00.256459Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:16:00.266310 waagent[1447]: 2024-02-12T19:16:00.266231Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:16:00.279068 waagent[1447]: 2024-02-12T19:16:00.278998Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:16:00.285468 waagent[1447]: 2024-02-12T19:16:00.285399Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:16:00.299129 waagent[1447]: 2024-02-12T19:16:00.298981Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:16:00.315984 waagent[1447]: 2024-02-12T19:16:00.315842Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:16:00.328119 waagent[1447]: 2024-02-12T19:16:00.328029Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:16:00.334403 waagent[1447]: 2024-02-12T19:16:00.334318Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:16:00.425166 waagent[1447]: 2024-02-12T19:16:00.424974Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:16:00.534025 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:16:00.555326 waagent[1447]: 2024-02-12T19:16:00.555159Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:16:00.560752 waagent[1447]: 2024-02-12T19:16:00.560660Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:16:00.567173 waagent[1447]: 2024-02-12T19:16:00.567096Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:16:00.574637 waagent[1447]: 2024-02-12T19:16:00.574560Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:16:00.580799 waagent[1447]: 2024-02-12T19:16:00.580713Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:16:00.586602 waagent[1447]: 2024-02-12T19:16:00.586529Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:16:00.761577 waagent[1447]: 2024-02-12T19:16:00.761457Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:16:00.768947 waagent[1447]: 2024-02-12T19:16:00.768897Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:16:00.774525 waagent[1447]: 2024-02-12T19:16:00.774451Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:16:02.185927 waagent[1447]: 2024-02-12T19:16:02.185772Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:16:02.216691 waagent[1447]: 2024-02-12T19:16:02.216611Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:16:02.223252 waagent[1447]: 2024-02-12T19:16:02.223182Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:16:02.303322 waagent[1447]: 2024-02-12T19:16:02.303168Z INFO Daemon Daemon Found private key matching thumbprint 6A03189609D04BE1504687A991440C8FB69D0875 Feb 12 19:16:02.313473 waagent[1447]: 2024-02-12T19:16:02.313383Z INFO Daemon Daemon Certificate with thumbprint F4DA7DA58A5C4D01D14F9D1976F20004C88F2F2C has no matching private key. Feb 12 19:16:02.325301 waagent[1447]: 2024-02-12T19:16:02.325216Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:16:02.353157 waagent[1447]: 2024-02-12T19:16:02.353095Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 2b4d8676-3193-4acd-80eb-f16207ff8eb5 New eTag: 12703265180095588897] Feb 12 19:16:02.366180 waagent[1447]: 2024-02-12T19:16:02.366094Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:16:02.385463 waagent[1447]: 2024-02-12T19:16:02.385378Z INFO Daemon Daemon Starting provisioning Feb 12 19:16:02.391603 waagent[1447]: 2024-02-12T19:16:02.391520Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:16:02.397172 waagent[1447]: 2024-02-12T19:16:02.397088Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-d216911d7c] Feb 12 19:16:02.449987 waagent[1447]: 2024-02-12T19:16:02.449845Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-d216911d7c] Feb 12 19:16:02.457155 waagent[1447]: 2024-02-12T19:16:02.457066Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:16:02.465127 waagent[1447]: 2024-02-12T19:16:02.465053Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:16:02.484163 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:16:02.484343 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:16:02.484402 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:16:02.484642 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:16:02.489773 systemd-networkd[1214]: eth0: DHCPv6 lease lost Feb 12 19:16:02.491338 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:16:02.491523 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:16:02.493511 systemd[1]: Starting systemd-networkd.service... Feb 12 19:16:02.521401 systemd-networkd[1500]: enP41244s1: Link UP Feb 12 19:16:02.521413 systemd-networkd[1500]: enP41244s1: Gained carrier Feb 12 19:16:02.522402 systemd-networkd[1500]: eth0: Link UP Feb 12 19:16:02.522414 systemd-networkd[1500]: eth0: Gained carrier Feb 12 19:16:02.522749 systemd-networkd[1500]: lo: Link UP Feb 12 19:16:02.522758 systemd-networkd[1500]: lo: Gained carrier Feb 12 19:16:02.522998 systemd-networkd[1500]: eth0: Gained IPv6LL Feb 12 19:16:02.523428 systemd-networkd[1500]: Enumeration completed Feb 12 19:16:02.523548 systemd[1]: Started systemd-networkd.service. Feb 12 19:16:02.525905 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:16:02.526710 systemd-networkd[1500]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:16:02.533518 waagent[1447]: 2024-02-12T19:16:02.533359Z INFO Daemon Daemon Create user account if not exists Feb 12 19:16:02.539804 waagent[1447]: 2024-02-12T19:16:02.539670Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:16:02.546774 waagent[1447]: 2024-02-12T19:16:02.546668Z INFO Daemon Daemon Configure sudoer Feb 12 19:16:02.552420 waagent[1447]: 2024-02-12T19:16:02.552337Z INFO Daemon Daemon Configure sshd Feb 12 19:16:02.557346 waagent[1447]: 2024-02-12T19:16:02.557269Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:16:02.557816 systemd-networkd[1500]: eth0: DHCPv4 address 10.200.20.38/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:16:02.564542 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:16:03.809667 waagent[1447]: 2024-02-12T19:16:03.809586Z INFO Daemon Daemon Provisioning complete Feb 12 19:16:03.834579 waagent[1447]: 2024-02-12T19:16:03.834513Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:16:03.841516 waagent[1447]: 2024-02-12T19:16:03.841436Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:16:03.852869 waagent[1447]: 2024-02-12T19:16:03.852789Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:16:04.154825 waagent[1509]: 2024-02-12T19:16:04.154658Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:16:04.155519 waagent[1509]: 2024-02-12T19:16:04.155453Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:16:04.155646 waagent[1509]: 2024-02-12T19:16:04.155599Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:16:04.176994 waagent[1509]: 2024-02-12T19:16:04.176911Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:16:04.177175 waagent[1509]: 2024-02-12T19:16:04.177125Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:16:04.254437 waagent[1509]: 2024-02-12T19:16:04.254294Z INFO ExtHandler ExtHandler Found private key matching thumbprint 6A03189609D04BE1504687A991440C8FB69D0875 Feb 12 19:16:04.254648 waagent[1509]: 2024-02-12T19:16:04.254593Z INFO ExtHandler ExtHandler Certificate with thumbprint F4DA7DA58A5C4D01D14F9D1976F20004C88F2F2C has no matching private key. Feb 12 19:16:04.254909 waagent[1509]: 2024-02-12T19:16:04.254858Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:16:04.272233 waagent[1509]: 2024-02-12T19:16:04.272176Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 9e43c471-d4b4-4c67-814b-4c30335501de New eTag: 12703265180095588897] Feb 12 19:16:04.272886 waagent[1509]: 2024-02-12T19:16:04.272830Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:16:04.386615 waagent[1509]: 2024-02-12T19:16:04.386469Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:16:04.410791 waagent[1509]: 2024-02-12T19:16:04.410637Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1509 Feb 12 19:16:04.414752 waagent[1509]: 2024-02-12T19:16:04.414655Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:16:04.416256 waagent[1509]: 2024-02-12T19:16:04.416195Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:16:04.547541 waagent[1509]: 2024-02-12T19:16:04.547481Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:16:04.548137 waagent[1509]: 2024-02-12T19:16:04.548082Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:16:04.555928 waagent[1509]: 2024-02-12T19:16:04.555877Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:16:04.556523 waagent[1509]: 2024-02-12T19:16:04.556471Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:16:04.557787 waagent[1509]: 2024-02-12T19:16:04.557701Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:16:04.559214 waagent[1509]: 2024-02-12T19:16:04.559148Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:16:04.559486 waagent[1509]: 2024-02-12T19:16:04.559418Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:16:04.560032 waagent[1509]: 2024-02-12T19:16:04.559959Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:16:04.560602 waagent[1509]: 2024-02-12T19:16:04.560538Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:16:04.561458 waagent[1509]: 2024-02-12T19:16:04.561386Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:16:04.561634 waagent[1509]: 2024-02-12T19:16:04.561571Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:16:04.561634 waagent[1509]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:16:04.561634 waagent[1509]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:16:04.561634 waagent[1509]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:16:04.561634 waagent[1509]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:16:04.561634 waagent[1509]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:16:04.561634 waagent[1509]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:16:04.562121 waagent[1509]: 2024-02-12T19:16:04.562046Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:16:04.564547 waagent[1509]: 2024-02-12T19:16:04.564404Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:16:04.564916 waagent[1509]: 2024-02-12T19:16:04.564842Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:16:04.565208 waagent[1509]: 2024-02-12T19:16:04.565142Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:16:04.566140 waagent[1509]: 2024-02-12T19:16:04.566066Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:16:04.566625 waagent[1509]: 2024-02-12T19:16:04.566565Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:16:04.566916 waagent[1509]: 2024-02-12T19:16:04.566867Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:16:04.568118 waagent[1509]: 2024-02-12T19:16:04.568060Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:16:04.568780 waagent[1509]: 2024-02-12T19:16:04.567975Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:16:04.569533 waagent[1509]: 2024-02-12T19:16:04.569471Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:16:04.578885 waagent[1509]: 2024-02-12T19:16:04.578809Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:16:04.581232 waagent[1509]: 2024-02-12T19:16:04.581173Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:16:04.582402 waagent[1509]: 2024-02-12T19:16:04.582340Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:16:04.607334 waagent[1509]: 2024-02-12T19:16:04.607188Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1500' Feb 12 19:16:04.631858 waagent[1509]: 2024-02-12T19:16:04.631782Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:16:04.708548 waagent[1509]: 2024-02-12T19:16:04.708370Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:16:04.708548 waagent[1509]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:16:04.708548 waagent[1509]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:16:04.708548 waagent[1509]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:8d:18 brd ff:ff:ff:ff:ff:ff Feb 12 19:16:04.708548 waagent[1509]: 3: enP41244s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:8d:18 brd ff:ff:ff:ff:ff:ff\ altname enP41244p0s2 Feb 12 19:16:04.708548 waagent[1509]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:16:04.708548 waagent[1509]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:16:04.708548 waagent[1509]: 2: eth0 inet 10.200.20.38/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:16:04.708548 waagent[1509]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:16:04.708548 waagent[1509]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:16:04.708548 waagent[1509]: 2: eth0 inet6 fe80::222:48ff:fec1:8d18/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:16:04.757629 waagent[1509]: 2024-02-12T19:16:04.756833Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:16:04.856509 waagent[1447]: 2024-02-12T19:16:04.856390Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:16:04.860696 waagent[1447]: 2024-02-12T19:16:04.860645Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:16:06.034856 waagent[1538]: 2024-02-12T19:16:06.034754Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:16:06.035537 waagent[1538]: 2024-02-12T19:16:06.035470Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:16:06.035666 waagent[1538]: 2024-02-12T19:16:06.035619Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:16:06.043350 waagent[1538]: 2024-02-12T19:16:06.043234Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:16:06.043740 waagent[1538]: 2024-02-12T19:16:06.043678Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:16:06.043906 waagent[1538]: 2024-02-12T19:16:06.043856Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:16:06.056525 waagent[1538]: 2024-02-12T19:16:06.056450Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:16:06.065631 waagent[1538]: 2024-02-12T19:16:06.065569Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:16:06.066713 waagent[1538]: 2024-02-12T19:16:06.066654Z INFO ExtHandler Feb 12 19:16:06.066881 waagent[1538]: 2024-02-12T19:16:06.066832Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: b240e126-8105-4c15-af0d-181d60ea417f eTag: 12703265180095588897 source: Fabric] Feb 12 19:16:06.067602 waagent[1538]: 2024-02-12T19:16:06.067544Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:16:06.068847 waagent[1538]: 2024-02-12T19:16:06.068784Z INFO ExtHandler Feb 12 19:16:06.068988 waagent[1538]: 2024-02-12T19:16:06.068941Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:16:06.076868 waagent[1538]: 2024-02-12T19:16:06.076814Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:16:06.077369 waagent[1538]: 2024-02-12T19:16:06.077318Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:16:06.097602 waagent[1538]: 2024-02-12T19:16:06.097540Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:16:06.168068 waagent[1538]: 2024-02-12T19:16:06.167936Z INFO ExtHandler Downloaded certificate {'thumbprint': 'F4DA7DA58A5C4D01D14F9D1976F20004C88F2F2C', 'hasPrivateKey': False} Feb 12 19:16:06.169092 waagent[1538]: 2024-02-12T19:16:06.169032Z INFO ExtHandler Downloaded certificate {'thumbprint': '6A03189609D04BE1504687A991440C8FB69D0875', 'hasPrivateKey': True} Feb 12 19:16:06.170183 waagent[1538]: 2024-02-12T19:16:06.170123Z INFO ExtHandler Fetch goal state completed Feb 12 19:16:06.195949 waagent[1538]: 2024-02-12T19:16:06.195880Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1538 Feb 12 19:16:06.199383 waagent[1538]: 2024-02-12T19:16:06.199325Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:16:06.200853 waagent[1538]: 2024-02-12T19:16:06.200792Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:16:06.205632 waagent[1538]: 2024-02-12T19:16:06.205566Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:16:06.206050 waagent[1538]: 2024-02-12T19:16:06.205989Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:16:06.214000 waagent[1538]: 2024-02-12T19:16:06.213940Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:16:06.214494 waagent[1538]: 2024-02-12T19:16:06.214435Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:16:06.220151 waagent[1538]: 2024-02-12T19:16:06.220033Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 12 19:16:06.223799 waagent[1538]: 2024-02-12T19:16:06.223716Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:16:06.225289 waagent[1538]: 2024-02-12T19:16:06.225218Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:16:06.225924 waagent[1538]: 2024-02-12T19:16:06.225861Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:16:06.226189 waagent[1538]: 2024-02-12T19:16:06.226140Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:16:06.226882 waagent[1538]: 2024-02-12T19:16:06.226815Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:16:06.227558 waagent[1538]: 2024-02-12T19:16:06.227486Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:16:06.228005 waagent[1538]: 2024-02-12T19:16:06.227938Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:16:06.228232 waagent[1538]: 2024-02-12T19:16:06.228150Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:16:06.228528 waagent[1538]: 2024-02-12T19:16:06.228455Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:16:06.228803 waagent[1538]: 2024-02-12T19:16:06.228721Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:16:06.228957 waagent[1538]: 2024-02-12T19:16:06.228893Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:16:06.228957 waagent[1538]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:16:06.228957 waagent[1538]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:16:06.228957 waagent[1538]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:16:06.228957 waagent[1538]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:16:06.228957 waagent[1538]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:16:06.228957 waagent[1538]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:16:06.229386 waagent[1538]: 2024-02-12T19:16:06.229310Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:16:06.229746 waagent[1538]: 2024-02-12T19:16:06.229656Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:16:06.230567 waagent[1538]: 2024-02-12T19:16:06.230489Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:16:06.232852 waagent[1538]: 2024-02-12T19:16:06.232715Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:16:06.233639 waagent[1538]: 2024-02-12T19:16:06.233555Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:16:06.234309 waagent[1538]: 2024-02-12T19:16:06.234249Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:16:06.259690 waagent[1538]: 2024-02-12T19:16:06.259382Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:16:06.263579 waagent[1538]: 2024-02-12T19:16:06.263506Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:16:06.272162 waagent[1538]: 2024-02-12T19:16:06.272084Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:16:06.272162 waagent[1538]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:16:06.272162 waagent[1538]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:16:06.272162 waagent[1538]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:8d:18 brd ff:ff:ff:ff:ff:ff Feb 12 19:16:06.272162 waagent[1538]: 3: enP41244s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:22:48:c1:8d:18 brd ff:ff:ff:ff:ff:ff\ altname enP41244p0s2 Feb 12 19:16:06.272162 waagent[1538]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:16:06.272162 waagent[1538]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:16:06.272162 waagent[1538]: 2: eth0 inet 10.200.20.38/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:16:06.272162 waagent[1538]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:16:06.272162 waagent[1538]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:16:06.272162 waagent[1538]: 2: eth0 inet6 fe80::222:48ff:fec1:8d18/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:16:06.285975 waagent[1538]: 2024-02-12T19:16:06.285864Z INFO ExtHandler ExtHandler Feb 12 19:16:06.286105 waagent[1538]: 2024-02-12T19:16:06.286042Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 1dfbdcbc-806a-4982-87a7-18b2d7c045fe correlation af19b094-db99-4ef2-901d-aba0da941a4a created: 2024-02-12T19:14:04.648323Z] Feb 12 19:16:06.287153 waagent[1538]: 2024-02-12T19:16:06.287090Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:16:06.288997 waagent[1538]: 2024-02-12T19:16:06.288943Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Feb 12 19:16:06.449062 waagent[1538]: 2024-02-12T19:16:06.448981Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:16:06.468656 waagent[1538]: 2024-02-12T19:16:06.468565Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 01EC520A-F477-462F-A27A-1641FB2A8E00;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:16:06.534705 waagent[1538]: 2024-02-12T19:16:06.534568Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 12 19:16:06.534705 waagent[1538]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:16:06.534705 waagent[1538]: pkts bytes target prot opt in out source destination Feb 12 19:16:06.534705 waagent[1538]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:16:06.534705 waagent[1538]: pkts bytes target prot opt in out source destination Feb 12 19:16:06.534705 waagent[1538]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:16:06.534705 waagent[1538]: pkts bytes target prot opt in out source destination Feb 12 19:16:06.534705 waagent[1538]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:16:06.534705 waagent[1538]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:16:06.534705 waagent[1538]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:16:06.551261 waagent[1538]: 2024-02-12T19:16:06.551140Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:16:06.551261 waagent[1538]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:16:06.551261 waagent[1538]: pkts bytes target prot opt in out source destination Feb 12 19:16:06.551261 waagent[1538]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:16:06.551261 waagent[1538]: pkts bytes target prot opt in out source destination Feb 12 19:16:06.551261 waagent[1538]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:16:06.551261 waagent[1538]: pkts bytes target prot opt in out source destination Feb 12 19:16:06.551261 waagent[1538]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:16:06.551261 waagent[1538]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:16:06.551261 waagent[1538]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:16:06.551815 waagent[1538]: 2024-02-12T19:16:06.551758Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:16:29.463130 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 12 19:16:36.571391 update_engine[1336]: I0212 19:16:36.571337 1336 update_attempter.cc:509] Updating boot flags... Feb 12 19:16:42.659956 systemd[1]: Created slice system-sshd.slice. Feb 12 19:16:42.661017 systemd[1]: Started sshd@0-10.200.20.38:22-10.200.12.6:47288.service. Feb 12 19:16:43.267973 sshd[1631]: Accepted publickey for core from 10.200.12.6 port 47288 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:43.289709 sshd[1631]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:43.293240 systemd-logind[1334]: New session 3 of user core. Feb 12 19:16:43.294041 systemd[1]: Started session-3.scope. Feb 12 19:16:43.634914 systemd[1]: Started sshd@1-10.200.20.38:22-10.200.12.6:47298.service. Feb 12 19:16:44.054446 sshd[1636]: Accepted publickey for core from 10.200.12.6 port 47298 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:44.055688 sshd[1636]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:44.059380 systemd-logind[1334]: New session 4 of user core. Feb 12 19:16:44.059822 systemd[1]: Started session-4.scope. Feb 12 19:16:44.359136 sshd[1636]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:44.361816 systemd[1]: sshd@1-10.200.20.38:22-10.200.12.6:47298.service: Deactivated successfully. Feb 12 19:16:44.362484 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:16:44.363013 systemd-logind[1334]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:16:44.363959 systemd-logind[1334]: Removed session 4. Feb 12 19:16:44.433335 systemd[1]: Started sshd@2-10.200.20.38:22-10.200.12.6:47310.service. Feb 12 19:16:44.880842 sshd[1642]: Accepted publickey for core from 10.200.12.6 port 47310 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:44.882052 sshd[1642]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:44.885703 systemd-logind[1334]: New session 5 of user core. Feb 12 19:16:44.886151 systemd[1]: Started session-5.scope. Feb 12 19:16:45.200745 sshd[1642]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:45.203360 systemd[1]: sshd@2-10.200.20.38:22-10.200.12.6:47310.service: Deactivated successfully. Feb 12 19:16:45.204047 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:16:45.204559 systemd-logind[1334]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:16:45.205322 systemd-logind[1334]: Removed session 5. Feb 12 19:16:45.270124 systemd[1]: Started sshd@3-10.200.20.38:22-10.200.12.6:47314.service. Feb 12 19:16:45.687335 sshd[1648]: Accepted publickey for core from 10.200.12.6 port 47314 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:45.688070 sshd[1648]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:45.691637 systemd-logind[1334]: New session 6 of user core. Feb 12 19:16:45.692076 systemd[1]: Started session-6.scope. Feb 12 19:16:45.989464 sshd[1648]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:45.992056 systemd-logind[1334]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:16:45.993038 systemd[1]: sshd@3-10.200.20.38:22-10.200.12.6:47314.service: Deactivated successfully. Feb 12 19:16:45.993647 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:16:45.994604 systemd-logind[1334]: Removed session 6. Feb 12 19:16:46.058746 systemd[1]: Started sshd@4-10.200.20.38:22-10.200.12.6:47318.service. Feb 12 19:16:46.474386 sshd[1654]: Accepted publickey for core from 10.200.12.6 port 47318 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:46.475910 sshd[1654]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:46.479492 systemd-logind[1334]: New session 7 of user core. Feb 12 19:16:46.479978 systemd[1]: Started session-7.scope. Feb 12 19:16:47.030505 sudo[1657]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:16:47.030703 sudo[1657]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:16:47.095916 dbus-daemon[1319]: avc: received setenforce notice (enforcing=1) Feb 12 19:16:47.097717 sudo[1657]: pam_unix(sudo:session): session closed for user root Feb 12 19:16:47.179361 sshd[1654]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:47.182542 systemd[1]: sshd@4-10.200.20.38:22-10.200.12.6:47318.service: Deactivated successfully. Feb 12 19:16:47.182911 systemd-logind[1334]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:16:47.183308 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:16:47.184117 systemd-logind[1334]: Removed session 7. Feb 12 19:16:47.249549 systemd[1]: Started sshd@5-10.200.20.38:22-10.200.12.6:43840.service. Feb 12 19:16:47.664275 sshd[1661]: Accepted publickey for core from 10.200.12.6 port 43840 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:47.666864 sshd[1661]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:47.670637 systemd-logind[1334]: New session 8 of user core. Feb 12 19:16:47.671082 systemd[1]: Started session-8.scope. Feb 12 19:16:47.900820 sudo[1665]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:16:47.901017 sudo[1665]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:16:47.903383 sudo[1665]: pam_unix(sudo:session): session closed for user root Feb 12 19:16:47.907291 sudo[1664]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:16:47.907802 sudo[1664]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:16:47.915881 systemd[1]: Stopping audit-rules.service... Feb 12 19:16:47.916000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:16:47.921160 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:16:47.921215 kernel: audit: type=1305 audit(1707765407.916:179): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:16:47.921400 auditctl[1668]: No rules Feb 12 19:16:47.931697 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:16:47.931883 systemd[1]: Stopped audit-rules.service. Feb 12 19:16:47.916000 audit[1668]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffea88600 a2=420 a3=0 items=0 ppid=1 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:47.954624 kernel: audit: type=1300 audit(1707765407.916:179): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=fffffea88600 a2=420 a3=0 items=0 ppid=1 pid=1668 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:47.933465 systemd[1]: Starting audit-rules.service... Feb 12 19:16:47.916000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:16:47.962608 kernel: audit: type=1327 audit(1707765407.916:179): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:16:47.931000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:47.978432 kernel: audit: type=1131 audit(1707765407.931:180): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:47.978664 augenrules[1685]: No rules Feb 12 19:16:47.979348 systemd[1]: Finished audit-rules.service. Feb 12 19:16:47.978000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:47.980669 sudo[1664]: pam_unix(sudo:session): session closed for user root Feb 12 19:16:47.979000 audit[1664]: USER_END pid=1664 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.013694 kernel: audit: type=1130 audit(1707765407.978:181): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.013774 kernel: audit: type=1106 audit(1707765407.979:182): pid=1664 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.013801 kernel: audit: type=1104 audit(1707765407.980:183): pid=1664 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:47.980000 audit[1664]: CRED_DISP pid=1664 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.059217 sshd[1661]: pam_unix(sshd:session): session closed for user core Feb 12 19:16:48.059000 audit[1661]: USER_END pid=1661 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:48.062223 systemd-logind[1334]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:16:48.062904 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:16:48.063470 systemd[1]: sshd@5-10.200.20.38:22-10.200.12.6:43840.service: Deactivated successfully. Feb 12 19:16:48.064919 systemd-logind[1334]: Removed session 8. Feb 12 19:16:48.059000 audit[1661]: CRED_DISP pid=1661 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:48.103587 kernel: audit: type=1106 audit(1707765408.059:184): pid=1661 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:48.103652 kernel: audit: type=1104 audit(1707765408.059:185): pid=1661 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:48.103685 kernel: audit: type=1131 audit(1707765408.062:186): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.38:22-10.200.12.6:43840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.062000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.38:22-10.200.12.6:43840 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.128249 systemd[1]: Started sshd@6-10.200.20.38:22-10.200.12.6:43854.service. Feb 12 19:16:48.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.38:22-10.200.12.6:43854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.540000 audit[1691]: USER_ACCT pid=1691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:48.541007 sshd[1691]: Accepted publickey for core from 10.200.12.6 port 43854 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:16:48.541000 audit[1691]: CRED_ACQ pid=1691 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:48.541000 audit[1691]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc8be61d0 a2=3 a3=1 items=0 ppid=1 pid=1691 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:48.541000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:16:48.542527 sshd[1691]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:16:48.546626 systemd[1]: Started session-9.scope. Feb 12 19:16:48.546960 systemd-logind[1334]: New session 9 of user core. Feb 12 19:16:48.550000 audit[1691]: USER_START pid=1691 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:48.551000 audit[1693]: CRED_ACQ pid=1693 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:16:48.776000 audit[1694]: USER_ACCT pid=1694 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.776000 audit[1694]: CRED_REFR pid=1694 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:48.777397 sudo[1694]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:16:48.777594 sudo[1694]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:16:48.778000 audit[1694]: USER_START pid=1694 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:16:49.526775 systemd[1]: Starting docker.service... Feb 12 19:16:49.576341 env[1709]: time="2024-02-12T19:16:49.576289928Z" level=info msg="Starting up" Feb 12 19:16:49.577947 env[1709]: time="2024-02-12T19:16:49.577920538Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:16:49.577947 env[1709]: time="2024-02-12T19:16:49.577940458Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:16:49.578071 env[1709]: time="2024-02-12T19:16:49.577958337Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:16:49.578071 env[1709]: time="2024-02-12T19:16:49.577968817Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:16:49.579635 env[1709]: time="2024-02-12T19:16:49.579612586Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:16:49.579744 env[1709]: time="2024-02-12T19:16:49.579713185Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:16:49.579822 env[1709]: time="2024-02-12T19:16:49.579803743Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:16:49.579877 env[1709]: time="2024-02-12T19:16:49.579864862Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:16:49.585292 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport96923090-merged.mount: Deactivated successfully. Feb 12 19:16:49.691281 env[1709]: time="2024-02-12T19:16:49.691101026Z" level=info msg="Loading containers: start." Feb 12 19:16:49.738000 audit[1737]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1737 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.738000 audit[1737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffea56bf70 a2=0 a3=1 items=0 ppid=1709 pid=1737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.738000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:16:49.739000 audit[1739]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.739000 audit[1739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=fffff68a27d0 a2=0 a3=1 items=0 ppid=1709 pid=1739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.739000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:16:49.741000 audit[1741]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.741000 audit[1741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffc7bf3d30 a2=0 a3=1 items=0 ppid=1709 pid=1741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.741000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:16:49.742000 audit[1743]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.742000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffd6f5d7f0 a2=0 a3=1 items=0 ppid=1709 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.742000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:16:49.744000 audit[1745]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1745 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.744000 audit[1745]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffe01fccd0 a2=0 a3=1 items=0 ppid=1709 pid=1745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.744000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:16:49.745000 audit[1747]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.745000 audit[1747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffff7134740 a2=0 a3=1 items=0 ppid=1709 pid=1747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.745000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:16:49.762000 audit[1749]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1749 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.762000 audit[1749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff90cf5c0 a2=0 a3=1 items=0 ppid=1709 pid=1749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.762000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:16:49.764000 audit[1751]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1751 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.764000 audit[1751]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=fffff34a95f0 a2=0 a3=1 items=0 ppid=1709 pid=1751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.764000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:16:49.766000 audit[1753]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.766000 audit[1753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffcb606610 a2=0 a3=1 items=0 ppid=1709 pid=1753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.766000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:49.789000 audit[1757]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1757 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.789000 audit[1757]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=fffff9397420 a2=0 a3=1 items=0 ppid=1709 pid=1757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.789000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:49.790000 audit[1758]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1758 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.790000 audit[1758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffdc53ac10 a2=0 a3=1 items=0 ppid=1709 pid=1758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:49.833755 kernel: Initializing XFRM netlink socket Feb 12 19:16:49.856360 env[1709]: time="2024-02-12T19:16:49.856320622Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:16:49.994000 audit[1766]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1766 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:49.994000 audit[1766]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffe06869b0 a2=0 a3=1 items=0 ppid=1709 pid=1766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:49.994000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:16:50.002000 audit[1769]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.002000 audit[1769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffd6fd5f90 a2=0 a3=1 items=0 ppid=1709 pid=1769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.002000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:16:50.005000 audit[1772]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.005000 audit[1772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffddd06cd0 a2=0 a3=1 items=0 ppid=1709 pid=1772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.005000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:16:50.007000 audit[1774]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.007000 audit[1774]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd9b8c8c0 a2=0 a3=1 items=0 ppid=1709 pid=1774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.007000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:16:50.008000 audit[1776]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1776 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.008000 audit[1776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd7bb2410 a2=0 a3=1 items=0 ppid=1709 pid=1776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.008000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:16:50.010000 audit[1778]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.010000 audit[1778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffd4d44e20 a2=0 a3=1 items=0 ppid=1709 pid=1778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.010000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:16:50.012000 audit[1780]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.012000 audit[1780]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=ffffdb142a80 a2=0 a3=1 items=0 ppid=1709 pid=1780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.012000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:16:50.013000 audit[1782]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1782 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.013000 audit[1782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=fffff6892860 a2=0 a3=1 items=0 ppid=1709 pid=1782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.013000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:16:50.015000 audit[1784]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1784 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.015000 audit[1784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffea3e2650 a2=0 a3=1 items=0 ppid=1709 pid=1784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.015000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:16:50.017000 audit[1786]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.017000 audit[1786]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=fffff2e246d0 a2=0 a3=1 items=0 ppid=1709 pid=1786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.017000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:16:50.018000 audit[1788]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1788 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.018000 audit[1788]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe399cd10 a2=0 a3=1 items=0 ppid=1709 pid=1788 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.018000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:16:50.020020 systemd-networkd[1500]: docker0: Link UP Feb 12 19:16:50.038000 audit[1792]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.038000 audit[1792]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcf7cf400 a2=0 a3=1 items=0 ppid=1709 pid=1792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.038000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:50.038000 audit[1793]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1793 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:16:50.038000 audit[1793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffea6451d0 a2=0 a3=1 items=0 ppid=1709 pid=1793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:16:50.038000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:16:50.040085 env[1709]: time="2024-02-12T19:16:50.040058979Z" level=info msg="Loading containers: done." Feb 12 19:16:50.048432 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck3202073493-merged.mount: Deactivated successfully. Feb 12 19:16:50.077819 env[1709]: time="2024-02-12T19:16:50.077776234Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:16:50.078215 env[1709]: time="2024-02-12T19:16:50.078196941Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:16:50.078383 env[1709]: time="2024-02-12T19:16:50.078367959Z" level=info msg="Daemon has completed initialization" Feb 12 19:16:50.110020 systemd[1]: Started docker.service. Feb 12 19:16:50.109000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:50.117401 env[1709]: time="2024-02-12T19:16:50.117343616Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:16:50.132967 systemd[1]: Reloading. Feb 12 19:16:50.195968 /usr/lib/systemd/system-generators/torcx-generator[1840]: time="2024-02-12T19:16:50Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:16:50.195996 /usr/lib/systemd/system-generators/torcx-generator[1840]: time="2024-02-12T19:16:50Z" level=info msg="torcx already run" Feb 12 19:16:50.265489 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:16:50.265508 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:16:50.282488 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:16:50.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.344000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.344000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit: BPF prog-id=38 op=LOAD Feb 12 19:16:50.345000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit: BPF prog-id=39 op=LOAD Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.345000 audit: BPF prog-id=40 op=LOAD Feb 12 19:16:50.345000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:16:50.345000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.346000 audit: BPF prog-id=41 op=LOAD Feb 12 19:16:50.346000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:16:50.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.347000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.347000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit: BPF prog-id=42 op=LOAD Feb 12 19:16:50.348000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit: BPF prog-id=43 op=LOAD Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit: BPF prog-id=44 op=LOAD Feb 12 19:16:50.348000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:16:50.348000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.348000 audit: BPF prog-id=45 op=LOAD Feb 12 19:16:50.348000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit: BPF prog-id=46 op=LOAD Feb 12 19:16:50.349000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit: BPF prog-id=47 op=LOAD Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.349000 audit: BPF prog-id=48 op=LOAD Feb 12 19:16:50.349000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:16:50.349000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit: BPF prog-id=49 op=LOAD Feb 12 19:16:50.351000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.351000 audit: BPF prog-id=50 op=LOAD Feb 12 19:16:50.351000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit: BPF prog-id=51 op=LOAD Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:16:50.353000 audit: BPF prog-id=52 op=LOAD Feb 12 19:16:50.353000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:16:50.353000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:16:50.359000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:16:50.360087 systemd[1]: Started kubelet.service. Feb 12 19:16:50.417612 kubelet[1899]: E0212 19:16:50.417545 1899 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:16:50.419000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:16:50.419835 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:16:50.419955 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:16:54.678600 env[1346]: time="2024-02-12T19:16:54.678545378Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\"" Feb 12 19:16:55.485925 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2365712339.mount: Deactivated successfully. Feb 12 19:16:57.621791 env[1346]: time="2024-02-12T19:16:57.621739954Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:57.626639 env[1346]: time="2024-02-12T19:16:57.626603211Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:57.631029 env[1346]: time="2024-02-12T19:16:57.631002435Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:57.636330 env[1346]: time="2024-02-12T19:16:57.636299487Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:cfcebda74d6e665b68931d3589ee69fde81cd503ff3169888e4502af65579d98,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:57.636960 env[1346]: time="2024-02-12T19:16:57.636926502Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.27.10\" returns image reference \"sha256:d19178cf7413f0942a116deaaea447983d297afb5dc7f62456c43839e7aaecfa\"" Feb 12 19:16:57.646367 env[1346]: time="2024-02-12T19:16:57.646330168Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\"" Feb 12 19:16:59.565500 env[1346]: time="2024-02-12T19:16:59.565433257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:59.594615 env[1346]: time="2024-02-12T19:16:59.594566562Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:59.611261 env[1346]: time="2024-02-12T19:16:59.611216850Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:59.624156 env[1346]: time="2024-02-12T19:16:59.624118945Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:fa168ebca1f6dbfe86ef0a690e007531c1f53569274fc7dc2774fe228b6ce8c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:16:59.624828 env[1346]: time="2024-02-12T19:16:59.624800398Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.27.10\" returns image reference \"sha256:6b9759f115be4c68b4a500b8c1d7bbeaf16e8e887b01eaf79c135b7b267baf95\"" Feb 12 19:16:59.633170 env[1346]: time="2024-02-12T19:16:59.633134981Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\"" Feb 12 19:17:00.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:00.539711 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:17:00.539902 systemd[1]: Stopped kubelet.service. Feb 12 19:17:00.541371 systemd[1]: Started kubelet.service. Feb 12 19:17:00.544748 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 12 19:17:00.544833 kernel: audit: type=1130 audit(1707765420.539:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:00.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:00.580741 kernel: audit: type=1131 audit(1707765420.539:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:00.580860 kernel: audit: type=1130 audit(1707765420.540:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:00.540000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:00.638340 kubelet[1931]: E0212 19:17:00.638269 1931 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:17:00.640000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:17:00.641170 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:17:00.641290 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:17:00.661759 kernel: audit: type=1131 audit(1707765420.640:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:17:01.137896 env[1346]: time="2024-02-12T19:17:01.137851869Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:01.147476 env[1346]: time="2024-02-12T19:17:01.147428540Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:01.158873 env[1346]: time="2024-02-12T19:17:01.158837721Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:01.165582 env[1346]: time="2024-02-12T19:17:01.165549257Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:09294de61e63987f181077cbc2f5c82463878af9cd8ecc6110c54150c9ae3143,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:01.166180 env[1346]: time="2024-02-12T19:17:01.166149482Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.27.10\" returns image reference \"sha256:745369ed75bfc0dd1319e4c64383b4ef2cb163cec6630fa288ad3fb6bf6624eb\"" Feb 12 19:17:01.175116 env[1346]: time="2024-02-12T19:17:01.175074613Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\"" Feb 12 19:17:02.298308 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2375394037.mount: Deactivated successfully. Feb 12 19:17:03.091311 env[1346]: time="2024-02-12T19:17:03.091260245Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:03.110621 env[1346]: time="2024-02-12T19:17:03.110558147Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:03.115382 env[1346]: time="2024-02-12T19:17:03.115346526Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.27.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:03.122265 env[1346]: time="2024-02-12T19:17:03.122214242Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:d084b53c772f62ec38fddb2348a82d4234016daf6cd43fedbf0b3281f3790f88,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:03.122830 env[1346]: time="2024-02-12T19:17:03.122801470Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.27.10\" returns image reference \"sha256:f17f9528c5073692925255c3de3f310109480873912e8b5ddc171ae1e64324ef\"" Feb 12 19:17:03.130718 env[1346]: time="2024-02-12T19:17:03.130684216Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:17:03.731203 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1646519848.mount: Deactivated successfully. Feb 12 19:17:03.767016 env[1346]: time="2024-02-12T19:17:03.766961910Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:03.776552 env[1346]: time="2024-02-12T19:17:03.776516869Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:03.781446 env[1346]: time="2024-02-12T19:17:03.781412158Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:03.788205 env[1346]: time="2024-02-12T19:17:03.788157205Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:03.788919 env[1346]: time="2024-02-12T19:17:03.788891700Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 12 19:17:03.798262 env[1346]: time="2024-02-12T19:17:03.798223679Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\"" Feb 12 19:17:04.730117 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1980605738.mount: Deactivated successfully. Feb 12 19:17:09.031699 env[1346]: time="2024-02-12T19:17:09.031643304Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:09.047715 env[1346]: time="2024-02-12T19:17:09.047663500Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:09.054445 env[1346]: time="2024-02-12T19:17:09.054414712Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.7-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:09.061675 env[1346]: time="2024-02-12T19:17:09.061645889Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:51eae8381dcb1078289fa7b4f3df2630cdc18d09fb56f8e56b41c40e191d6c83,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:09.062472 env[1346]: time="2024-02-12T19:17:09.062447709Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.7-0\" returns image reference \"sha256:24bc64e911039ecf00e263be2161797c758b7d82403ca5516ab64047a477f737\"" Feb 12 19:17:09.071216 env[1346]: time="2024-02-12T19:17:09.071187852Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 19:17:09.945168 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount970865121.mount: Deactivated successfully. Feb 12 19:17:10.547855 env[1346]: time="2024-02-12T19:17:10.547784368Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:10.558080 env[1346]: time="2024-02-12T19:17:10.558045496Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:10.563064 env[1346]: time="2024-02-12T19:17:10.563039091Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:10.572354 env[1346]: time="2024-02-12T19:17:10.572321051Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:10.572746 env[1346]: time="2024-02-12T19:17:10.572698383Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 12 19:17:10.789000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:10.789744 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 19:17:10.789917 systemd[1]: Stopped kubelet.service. Feb 12 19:17:10.791355 systemd[1]: Started kubelet.service. Feb 12 19:17:10.789000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:10.832022 kernel: audit: type=1130 audit(1707765430.789:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:10.832153 kernel: audit: type=1131 audit(1707765430.789:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:10.832180 kernel: audit: type=1130 audit(1707765430.790:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:10.790000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:10.895088 kubelet[1964]: E0212 19:17:10.895048 1964 run.go:74] "command failed" err="failed to load kubelet config file, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory, path: /var/lib/kubelet/config.yaml" Feb 12 19:17:10.897365 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:17:10.896000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:17:10.897485 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:17:10.918115 kernel: audit: type=1131 audit(1707765430.896:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:17:14.435821 systemd[1]: Stopped kubelet.service. Feb 12 19:17:14.434000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:14.434000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:14.476425 kernel: audit: type=1130 audit(1707765434.434:403): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:14.476566 kernel: audit: type=1131 audit(1707765434.434:404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:14.485818 systemd[1]: Reloading. Feb 12 19:17:14.542905 /usr/lib/systemd/system-generators/torcx-generator[2049]: time="2024-02-12T19:17:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:17:14.542935 /usr/lib/systemd/system-generators/torcx-generator[2049]: time="2024-02-12T19:17:14Z" level=info msg="torcx already run" Feb 12 19:17:14.619743 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:17:14.619910 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:17:14.637107 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:17:14.700000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.742731 kernel: audit: type=1400 audit(1707765434.700:405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.742815 kernel: audit: type=1400 audit(1707765434.720:406): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.762569 kernel: audit: type=1400 audit(1707765434.720:407): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit: BPF prog-id=53 op=LOAD Feb 12 19:17:14.720000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit: BPF prog-id=54 op=LOAD Feb 12 19:17:14.763740 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit: BPF prog-id=55 op=LOAD Feb 12 19:17:14.720000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:17:14.720000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.720000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit: BPF prog-id=56 op=LOAD Feb 12 19:17:14.741000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.741000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit: BPF prog-id=57 op=LOAD Feb 12 19:17:14.761000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.761000 audit: BPF prog-id=58 op=LOAD Feb 12 19:17:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.766000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.766000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.766000 audit: BPF prog-id=59 op=LOAD Feb 12 19:17:14.766000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:17:14.766000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.767000 audit: BPF prog-id=60 op=LOAD Feb 12 19:17:14.767000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit: BPF prog-id=61 op=LOAD Feb 12 19:17:14.768000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit: BPF prog-id=62 op=LOAD Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.768000 audit: BPF prog-id=63 op=LOAD Feb 12 19:17:14.768000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:17:14.768000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.769000 audit: BPF prog-id=64 op=LOAD Feb 12 19:17:14.769000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.770000 audit: BPF prog-id=65 op=LOAD Feb 12 19:17:14.770000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit: BPF prog-id=66 op=LOAD Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:14.771000 audit: BPF prog-id=67 op=LOAD Feb 12 19:17:14.771000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:17:14.771000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:17:14.800175 systemd[1]: Started kubelet.service. Feb 12 19:17:14.798000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:14.861580 kubelet[2109]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:17:14.861580 kubelet[2109]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:17:14.861580 kubelet[2109]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:17:14.861961 kubelet[2109]: I0212 19:17:14.861616 2109 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:17:15.342097 kubelet[2109]: I0212 19:17:15.342060 2109 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:17:15.342097 kubelet[2109]: I0212 19:17:15.342092 2109 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:17:15.342305 kubelet[2109]: I0212 19:17:15.342284 2109 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:17:15.346240 kubelet[2109]: E0212 19:17:15.346212 2109 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.38:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:15.346408 kubelet[2109]: I0212 19:17:15.346396 2109 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:17:15.347676 kubelet[2109]: W0212 19:17:15.347652 2109 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:17:15.348194 kubelet[2109]: I0212 19:17:15.348177 2109 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:17:15.348385 kubelet[2109]: I0212 19:17:15.348371 2109 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:17:15.348451 kubelet[2109]: I0212 19:17:15.348434 2109 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:} {Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:17:15.348540 kubelet[2109]: I0212 19:17:15.348459 2109 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:17:15.348540 kubelet[2109]: I0212 19:17:15.348471 2109 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:17:15.348629 kubelet[2109]: I0212 19:17:15.348565 2109 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:17:15.351469 kubelet[2109]: I0212 19:17:15.351450 2109 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:17:15.351580 kubelet[2109]: I0212 19:17:15.351569 2109 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:17:15.351665 kubelet[2109]: I0212 19:17:15.351655 2109 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:17:15.351756 kubelet[2109]: I0212 19:17:15.351720 2109 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:17:15.352375 kubelet[2109]: W0212 19:17:15.352335 2109 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-d216911d7c&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:15.352501 kubelet[2109]: E0212 19:17:15.352489 2109 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-d216911d7c&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:15.352764 kubelet[2109]: W0212 19:17:15.352700 2109 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:15.352869 kubelet[2109]: E0212 19:17:15.352858 2109 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:15.353039 kubelet[2109]: I0212 19:17:15.353028 2109 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:17:15.353381 kubelet[2109]: W0212 19:17:15.353366 2109 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:17:15.353917 kubelet[2109]: I0212 19:17:15.353901 2109 server.go:1168] "Started kubelet" Feb 12 19:17:15.353000 audit[2109]: AVC avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.353000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:15.356389 kubelet[2109]: I0212 19:17:15.356075 2109 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:17:15.353000 audit[2109]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d54060 a1=40007c3bc0 a2=4000d54030 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.353000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:15.356711 kubelet[2109]: I0212 19:17:15.356696 2109 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:17:15.355000 audit[2109]: AVC avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.356877 kubelet[2109]: I0212 19:17:15.356800 2109 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:17:15.355000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:15.355000 audit[2109]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000855700 a1=40007c3bd8 a2=4000d540f0 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.355000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:15.357114 kubelet[2109]: E0212 19:17:15.357094 2109 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:17:15.357164 kubelet[2109]: E0212 19:17:15.357117 2109 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:17:15.357216 kubelet[2109]: I0212 19:17:15.357202 2109 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:17:15.357603 kubelet[2109]: I0212 19:17:15.357587 2109 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:17:15.357749 kubelet[2109]: E0212 19:17:15.357644 2109 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-d216911d7c.17b3339d85f55059", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-d216911d7c", UID:"ci-3510.3.2-a-d216911d7c", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-d216911d7c"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 17, 15, 353878617, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 17, 15, 353878617, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'Post "https://10.200.20.38:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.38:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:17:15.358363 kubelet[2109]: I0212 19:17:15.356749 2109 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:17:15.361114 kubelet[2109]: I0212 19:17:15.360385 2109 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:17:15.361114 kubelet[2109]: I0212 19:17:15.360471 2109 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:17:15.361114 kubelet[2109]: W0212 19:17:15.360811 2109 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:15.361114 kubelet[2109]: E0212 19:17:15.360850 2109 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:15.361616 kubelet[2109]: E0212 19:17:15.361592 2109 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-d216911d7c?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="200ms" Feb 12 19:17:15.370000 audit[2121]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2121 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:15.370000 audit[2121]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffd112aa90 a2=0 a3=1 items=0 ppid=2109 pid=2121 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.370000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:17:15.372000 audit[2122]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2122 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:15.372000 audit[2122]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc435b4e0 a2=0 a3=1 items=0 ppid=2109 pid=2122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.372000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:17:15.376000 audit[2124]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2124 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:15.376000 audit[2124]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffffc981e80 a2=0 a3=1 items=0 ppid=2109 pid=2124 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.376000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:17:15.379000 audit[2126]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2126 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:15.379000 audit[2126]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=fffff58661b0 a2=0 a3=1 items=0 ppid=2109 pid=2126 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.379000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:17:15.397589 kubelet[2109]: I0212 19:17:15.397561 2109 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:17:15.397589 kubelet[2109]: I0212 19:17:15.397581 2109 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:17:15.397589 kubelet[2109]: I0212 19:17:15.397598 2109 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:17:15.405776 kubelet[2109]: I0212 19:17:15.405748 2109 policy_none.go:49] "None policy: Start" Feb 12 19:17:15.406506 kubelet[2109]: I0212 19:17:15.406486 2109 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:17:15.406551 kubelet[2109]: I0212 19:17:15.406514 2109 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:17:15.414034 systemd[1]: Created slice kubepods.slice. Feb 12 19:17:15.417872 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:17:15.420898 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:17:15.428560 kubelet[2109]: I0212 19:17:15.428532 2109 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:17:15.426000 audit[2109]: AVC avc: denied { mac_admin } for pid=2109 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:15.426000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:15.426000 audit[2109]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b27590 a1=4000b9ed68 a2=4000b27560 a3=25 items=0 ppid=1 pid=2109 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.426000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:15.428854 kubelet[2109]: I0212 19:17:15.428603 2109 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:17:15.428854 kubelet[2109]: I0212 19:17:15.428780 2109 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:17:15.430610 kubelet[2109]: E0212 19:17:15.430508 2109 eviction_manager.go:262] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-d216911d7c\" not found" Feb 12 19:17:15.464795 kubelet[2109]: I0212 19:17:15.464773 2109 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.465400 kubelet[2109]: E0212 19:17:15.465386 2109 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.463000 audit[2131]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2131 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:15.463000 audit[2131]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=ffffd1dcab10 a2=0 a3=1 items=0 ppid=2109 pid=2131 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.463000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:17:15.466045 kubelet[2109]: I0212 19:17:15.466033 2109 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:17:15.465000 audit[2132]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2132 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:15.465000 audit[2132]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe18eaec0 a2=0 a3=1 items=0 ppid=2109 pid=2132 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:17:15.467229 kubelet[2109]: I0212 19:17:15.467216 2109 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:17:15.467319 kubelet[2109]: I0212 19:17:15.467308 2109 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:17:15.467392 kubelet[2109]: I0212 19:17:15.467382 2109 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:17:15.467489 kubelet[2109]: E0212 19:17:15.467481 2109 kubelet.go:2281] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:17:15.468116 kubelet[2109]: W0212 19:17:15.468079 2109 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:15.468261 kubelet[2109]: E0212 19:17:15.468249 2109 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:15.466000 audit[2134]: NETFILTER_CFG table=mangle:35 family=10 entries=1 op=nft_register_chain pid=2134 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:15.466000 audit[2134]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdf1d55f0 a2=0 a3=1 items=0 ppid=2109 pid=2134 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.466000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:17:15.467000 audit[2133]: NETFILTER_CFG table=mangle:36 family=2 entries=1 op=nft_register_chain pid=2133 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:15.467000 audit[2133]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc3397c10 a2=0 a3=1 items=0 ppid=2109 pid=2133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.467000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:17:15.467000 audit[2135]: NETFILTER_CFG table=nat:37 family=10 entries=2 op=nft_register_chain pid=2135 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:15.467000 audit[2135]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffcb3d7ea0 a2=0 a3=1 items=0 ppid=2109 pid=2135 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.467000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:17:15.468000 audit[2136]: NETFILTER_CFG table=filter:38 family=10 entries=2 op=nft_register_chain pid=2136 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:15.468000 audit[2136]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe458a2c0 a2=0 a3=1 items=0 ppid=2109 pid=2136 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.468000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:17:15.469000 audit[2137]: NETFILTER_CFG table=nat:39 family=2 entries=1 op=nft_register_chain pid=2137 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:15.469000 audit[2137]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffcdb329e0 a2=0 a3=1 items=0 ppid=2109 pid=2137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.469000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:17:15.470000 audit[2138]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2138 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:15.470000 audit[2138]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0feaff0 a2=0 a3=1 items=0 ppid=2109 pid=2138 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:15.470000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:17:15.562193 kubelet[2109]: E0212 19:17:15.562163 2109 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-d216911d7c?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="400ms" Feb 12 19:17:15.568438 kubelet[2109]: I0212 19:17:15.568420 2109 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:15.569828 kubelet[2109]: I0212 19:17:15.569805 2109 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:15.571151 kubelet[2109]: I0212 19:17:15.571129 2109 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:15.576941 systemd[1]: Created slice kubepods-burstable-pod05c3a2772c7ac5aada9716666f9dfc77.slice. Feb 12 19:17:15.587003 systemd[1]: Created slice kubepods-burstable-pod6d0854e4c13fef083f7f4526911aae63.slice. Feb 12 19:17:15.590545 systemd[1]: Created slice kubepods-burstable-pode3508d7c48bf966b9d65c97b3dca7eaf.slice. Feb 12 19:17:15.666777 kubelet[2109]: I0212 19:17:15.664270 2109 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.666777 kubelet[2109]: I0212 19:17:15.664310 2109 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6d0854e4c13fef083f7f4526911aae63-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-d216911d7c\" (UID: \"6d0854e4c13fef083f7f4526911aae63\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.666777 kubelet[2109]: I0212 19:17:15.664333 2109 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/05c3a2772c7ac5aada9716666f9dfc77-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-d216911d7c\" (UID: \"05c3a2772c7ac5aada9716666f9dfc77\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.666777 kubelet[2109]: I0212 19:17:15.664354 2109 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/05c3a2772c7ac5aada9716666f9dfc77-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-d216911d7c\" (UID: \"05c3a2772c7ac5aada9716666f9dfc77\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.666777 kubelet[2109]: I0212 19:17:15.664374 2109 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.666986 kubelet[2109]: I0212 19:17:15.664393 2109 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.666986 kubelet[2109]: I0212 19:17:15.664413 2109 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/05c3a2772c7ac5aada9716666f9dfc77-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-d216911d7c\" (UID: \"05c3a2772c7ac5aada9716666f9dfc77\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.666986 kubelet[2109]: I0212 19:17:15.664432 2109 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.666986 kubelet[2109]: I0212 19:17:15.664458 2109 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.668451 kubelet[2109]: I0212 19:17:15.668424 2109 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.669002 kubelet[2109]: E0212 19:17:15.668988 2109 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:15.885988 env[1346]: time="2024-02-12T19:17:15.885919038Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-d216911d7c,Uid:05c3a2772c7ac5aada9716666f9dfc77,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:15.890967 env[1346]: time="2024-02-12T19:17:15.890936794Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-d216911d7c,Uid:6d0854e4c13fef083f7f4526911aae63,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:15.893124 env[1346]: time="2024-02-12T19:17:15.893088975Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-d216911d7c,Uid:e3508d7c48bf966b9d65c97b3dca7eaf,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:15.963273 kubelet[2109]: E0212 19:17:15.962884 2109 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-d216911d7c?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="800ms" Feb 12 19:17:16.070968 kubelet[2109]: I0212 19:17:16.070939 2109 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:16.071244 kubelet[2109]: E0212 19:17:16.071226 2109 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:16.206249 kubelet[2109]: W0212 19:17:16.206188 2109 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:16.206249 kubelet[2109]: E0212 19:17:16.206253 2109 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.38:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:16.289565 kubelet[2109]: W0212 19:17:16.289135 2109 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:16.289565 kubelet[2109]: E0212 19:17:16.289192 2109 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.38:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:16.599524 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount639031367.mount: Deactivated successfully. Feb 12 19:17:16.622173 env[1346]: time="2024-02-12T19:17:16.622124821Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.648346 env[1346]: time="2024-02-12T19:17:16.648304333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.654618 env[1346]: time="2024-02-12T19:17:16.654572138Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.660918 env[1346]: time="2024-02-12T19:17:16.660875302Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.668375 env[1346]: time="2024-02-12T19:17:16.668330672Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.673319 env[1346]: time="2024-02-12T19:17:16.673279001Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.676426 env[1346]: time="2024-02-12T19:17:16.676396924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.681231 env[1346]: time="2024-02-12T19:17:16.681203262Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.684171 env[1346]: time="2024-02-12T19:17:16.684144837Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.688236 env[1346]: time="2024-02-12T19:17:16.688202301Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.702379 env[1346]: time="2024-02-12T19:17:16.702341531Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.727703 env[1346]: time="2024-02-12T19:17:16.727654097Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:16.763664 kubelet[2109]: E0212 19:17:16.763610 2109 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-d216911d7c?timeout=10s\": dial tcp 10.200.20.38:6443: connect: connection refused" interval="1.6s" Feb 12 19:17:16.766682 env[1346]: time="2024-02-12T19:17:16.766522810Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:16.766682 env[1346]: time="2024-02-12T19:17:16.766570887Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:16.766682 env[1346]: time="2024-02-12T19:17:16.766581366Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:16.767265 env[1346]: time="2024-02-12T19:17:16.767220606Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/60697a519f76d5b7024ba6a17205c978bf78bd4396aeb868b585db2f26f13fa8 pid=2147 runtime=io.containerd.runc.v2 Feb 12 19:17:16.782592 systemd[1]: Started cri-containerd-60697a519f76d5b7024ba6a17205c978bf78bd4396aeb868b585db2f26f13fa8.scope. Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.803353 kernel: kauditd_printk_skb: 219 callbacks suppressed Feb 12 19:17:16.803451 kernel: audit: type=1400 audit(1707765436.795:592): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.841007 kernel: audit: type=1400 audit(1707765436.795:593): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.859850 kernel: audit: type=1400 audit(1707765436.795:594): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.860128 env[1346]: time="2024-02-12T19:17:16.849931718Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:16.860128 env[1346]: time="2024-02-12T19:17:16.850003874Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:16.860128 env[1346]: time="2024-02-12T19:17:16.850015393Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:16.860128 env[1346]: time="2024-02-12T19:17:16.850168863Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/65ef1bfee62887a1623e8be1d4128465a0f824c93e12d7bf09b5c3ca285e5c54 pid=2182 runtime=io.containerd.runc.v2 Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.880700 kernel: audit: type=1400 audit(1707765436.795:595): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.882129 kubelet[2109]: I0212 19:17:16.882099 2109 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:16.882960 kubelet[2109]: E0212 19:17:16.882933 2109 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.38:6443/api/v1/nodes\": dial tcp 10.200.20.38:6443: connect: connection refused" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:16.905900 kernel: audit: type=1400 audit(1707765436.795:596): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.926230 kernel: audit: type=1400 audit(1707765436.795:597): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.926323 kubelet[2109]: W0212 19:17:16.907473 2109 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-d216911d7c&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:16.926323 kubelet[2109]: E0212 19:17:16.907547 2109 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.38:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-d216911d7c&limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:16.926568 env[1346]: time="2024-02-12T19:17:16.912801000Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:16.926568 env[1346]: time="2024-02-12T19:17:16.912834878Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:16.926568 env[1346]: time="2024-02-12T19:17:16.912844717Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:16.926568 env[1346]: time="2024-02-12T19:17:16.912961030Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e220ce475ac0dfd0e4908d26db6732699dc1f0791f91a33479e691c43bd73f4 pid=2202 runtime=io.containerd.runc.v2 Feb 12 19:17:16.929034 systemd[1]: Started cri-containerd-65ef1bfee62887a1623e8be1d4128465a0f824c93e12d7bf09b5c3ca285e5c54.scope. Feb 12 19:17:16.949679 kernel: audit: type=1400 audit(1707765436.795:598): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.949972 kubelet[2109]: W0212 19:17:16.933350 2109 reflector.go:533] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:16.949972 kubelet[2109]: E0212 19:17:16.933397 2109 reflector.go:148] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.38:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.38:6443: connect: connection refused Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.996666 kernel: audit: type=1400 audit(1707765436.795:599): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.996786 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:17:16.996807 kernel: audit: type=1400 audit(1707765436.795:600): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.795000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.795000 audit: BPF prog-id=68 op=LOAD Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.999936 systemd[1]: Started cri-containerd-5e220ce475ac0dfd0e4908d26db6732699dc1f0791f91a33479e691c43bd73f4.scope. Feb 12 19:17:16.796000 audit[2156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2147 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:16.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363937613531396637366435623730323462613661313732303563 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2147 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:16.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363937613531396637366435623730323462613661313732303563 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.796000 audit: BPF prog-id=69 op=LOAD Feb 12 19:17:16.796000 audit[2156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2147 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:16.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363937613531396637366435623730323462613661313732303563 Feb 12 19:17:16.802000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.802000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.802000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.802000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.802000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.802000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.802000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.802000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.802000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.802000 audit: BPF prog-id=70 op=LOAD Feb 12 19:17:16.802000 audit[2156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2147 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:16.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363937613531396637366435623730323462613661313732303563 Feb 12 19:17:16.821000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:17:16.821000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { perfmon } for pid=2156 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit[2156]: AVC avc: denied { bpf } for pid=2156 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.821000 audit: BPF prog-id=71 op=LOAD Feb 12 19:17:16.821000 audit[2156]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2147 pid=2156 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:16.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3630363937613531396637366435623730323462613661313732303563 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.950000 audit: BPF prog-id=72 op=LOAD Feb 12 19:17:16.976000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:16.976000 audit[2192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:16.976000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635656631626665653632383837613136323365386265316434313238 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit: BPF prog-id=73 op=LOAD Feb 12 19:17:17.002000 audit[2192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635656631626665653632383837613136323365386265316434313238 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit: BPF prog-id=74 op=LOAD Feb 12 19:17:17.002000 audit[2192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635656631626665653632383837613136323365386265316434313238 Feb 12 19:17:17.002000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:17:17.002000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { perfmon } for pid=2192 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit[2192]: AVC avc: denied { bpf } for pid=2192 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.002000 audit: BPF prog-id=75 op=LOAD Feb 12 19:17:17.002000 audit[2192]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2182 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.002000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3635656631626665653632383837613136323365386265316434313238 Feb 12 19:17:17.014814 env[1346]: time="2024-02-12T19:17:17.013365486Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-d216911d7c,Uid:05c3a2772c7ac5aada9716666f9dfc77,Namespace:kube-system,Attempt:0,} returns sandbox id \"60697a519f76d5b7024ba6a17205c978bf78bd4396aeb868b585db2f26f13fa8\"" Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.018000 audit: BPF prog-id=76 op=LOAD Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2202 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323230636534373561633064666430653439303864323664623637 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2202 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323230636534373561633064666430653439303864323664623637 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit: BPF prog-id=77 op=LOAD Feb 12 19:17:17.019000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2202 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323230636534373561633064666430653439303864323664623637 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit: BPF prog-id=78 op=LOAD Feb 12 19:17:17.019000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2202 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323230636534373561633064666430653439303864323664623637 Feb 12 19:17:17.019000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:17:17.019000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { perfmon } for pid=2219 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit[2219]: AVC avc: denied { bpf } for pid=2219 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.019000 audit: BPF prog-id=79 op=LOAD Feb 12 19:17:17.019000 audit[2219]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2202 pid=2219 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.019000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565323230636534373561633064666430653439303864323664623637 Feb 12 19:17:17.022446 env[1346]: time="2024-02-12T19:17:17.022072831Z" level=info msg="CreateContainer within sandbox \"60697a519f76d5b7024ba6a17205c978bf78bd4396aeb868b585db2f26f13fa8\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:17:17.035464 env[1346]: time="2024-02-12T19:17:17.035421171Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-d216911d7c,Uid:6d0854e4c13fef083f7f4526911aae63,Namespace:kube-system,Attempt:0,} returns sandbox id \"65ef1bfee62887a1623e8be1d4128465a0f824c93e12d7bf09b5c3ca285e5c54\"" Feb 12 19:17:17.041970 env[1346]: time="2024-02-12T19:17:17.041920932Z" level=info msg="CreateContainer within sandbox \"65ef1bfee62887a1623e8be1d4128465a0f824c93e12d7bf09b5c3ca285e5c54\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:17:17.050719 env[1346]: time="2024-02-12T19:17:17.050641516Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-d216911d7c,Uid:e3508d7c48bf966b9d65c97b3dca7eaf,Namespace:kube-system,Attempt:0,} returns sandbox id \"5e220ce475ac0dfd0e4908d26db6732699dc1f0791f91a33479e691c43bd73f4\"" Feb 12 19:17:17.054106 env[1346]: time="2024-02-12T19:17:17.054063066Z" level=info msg="CreateContainer within sandbox \"5e220ce475ac0dfd0e4908d26db6732699dc1f0791f91a33479e691c43bd73f4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:17:17.103659 env[1346]: time="2024-02-12T19:17:17.103609943Z" level=info msg="CreateContainer within sandbox \"60697a519f76d5b7024ba6a17205c978bf78bd4396aeb868b585db2f26f13fa8\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"b025eb02beeaeccc14f531df2170fa962cf5e31ac747b847e3166c1b2f9b0828\"" Feb 12 19:17:17.104536 env[1346]: time="2024-02-12T19:17:17.104502528Z" level=info msg="StartContainer for \"b025eb02beeaeccc14f531df2170fa962cf5e31ac747b847e3166c1b2f9b0828\"" Feb 12 19:17:17.120014 systemd[1]: Started cri-containerd-b025eb02beeaeccc14f531df2170fa962cf5e31ac747b847e3166c1b2f9b0828.scope. Feb 12 19:17:17.125697 env[1346]: time="2024-02-12T19:17:17.125653908Z" level=info msg="CreateContainer within sandbox \"65ef1bfee62887a1623e8be1d4128465a0f824c93e12d7bf09b5c3ca285e5c54\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068\"" Feb 12 19:17:17.126557 env[1346]: time="2024-02-12T19:17:17.126530015Z" level=info msg="StartContainer for \"47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068\"" Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.141000 audit: BPF prog-id=80 op=LOAD Feb 12 19:17:17.142000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.142000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=2147 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323565623032626565616563636331346635333164663231373066 Feb 12 19:17:17.142000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.142000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2147 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.142000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323565623032626565616563636331346635333164663231373066 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit: BPF prog-id=81 op=LOAD Feb 12 19:17:17.143000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=2147 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323565623032626565616563636331346635333164663231373066 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.143000 audit: BPF prog-id=82 op=LOAD Feb 12 19:17:17.143000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=2147 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.143000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323565623032626565616563636331346635333164663231373066 Feb 12 19:17:17.144000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:17:17.144000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.144000 audit: BPF prog-id=83 op=LOAD Feb 12 19:17:17.144000 audit[2279]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=2147 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.144000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6230323565623032626565616563636331346635333164663231373066 Feb 12 19:17:17.157983 systemd[1]: Started cri-containerd-47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068.scope. Feb 12 19:17:17.159259 env[1346]: time="2024-02-12T19:17:17.159219086Z" level=info msg="CreateContainer within sandbox \"5e220ce475ac0dfd0e4908d26db6732699dc1f0791f91a33479e691c43bd73f4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7\"" Feb 12 19:17:17.160310 env[1346]: time="2024-02-12T19:17:17.160280901Z" level=info msg="StartContainer for \"b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7\"" Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.190000 audit: BPF prog-id=84 op=LOAD Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=400011db38 a2=10 a3=0 items=0 ppid=2182 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303135343134303535663839613636643339326562623166626562 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2182 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303135343134303535663839613636643339326562623166626562 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit: BPF prog-id=85 op=LOAD Feb 12 19:17:17.191000 audit[2301]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2182 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303135343134303535663839613636643339326562623166626562 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit: BPF prog-id=86 op=LOAD Feb 12 19:17:17.191000 audit[2301]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2182 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303135343134303535663839613636643339326562623166626562 Feb 12 19:17:17.191000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:17:17.191000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { perfmon } for pid=2301 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit[2301]: AVC avc: denied { bpf } for pid=2301 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.191000 audit: BPF prog-id=87 op=LOAD Feb 12 19:17:17.191000 audit[2301]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2182 pid=2301 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3437303135343134303535663839613636643339326562623166626562 Feb 12 19:17:17.198333 env[1346]: time="2024-02-12T19:17:17.198288726Z" level=info msg="StartContainer for \"b025eb02beeaeccc14f531df2170fa962cf5e31ac747b847e3166c1b2f9b0828\" returns successfully" Feb 12 19:17:17.205655 systemd[1]: Started cri-containerd-b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7.scope. Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.231000 audit: BPF prog-id=88 op=LOAD Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2202 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656461373034633338356235313562313738623730636535663363 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2202 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656461373034633338356235313562313738623730636535663363 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit: BPF prog-id=89 op=LOAD Feb 12 19:17:17.232000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2202 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656461373034633338356235313562313738623730636535663363 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit: BPF prog-id=90 op=LOAD Feb 12 19:17:17.232000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2202 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656461373034633338356235313562313738623730636535663363 Feb 12 19:17:17.232000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:17:17.232000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { perfmon } for pid=2332 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit[2332]: AVC avc: denied { bpf } for pid=2332 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:17.232000 audit: BPF prog-id=91 op=LOAD Feb 12 19:17:17.232000 audit[2332]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2202 pid=2332 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:17.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6237656461373034633338356235313562313738623730636535663363 Feb 12 19:17:17.240047 env[1346]: time="2024-02-12T19:17:17.239996884Z" level=info msg="StartContainer for \"47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068\" returns successfully" Feb 12 19:17:17.271273 env[1346]: time="2024-02-12T19:17:17.271214247Z" level=info msg="StartContainer for \"b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7\" returns successfully" Feb 12 19:17:17.595275 systemd[1]: run-containerd-runc-k8s.io-60697a519f76d5b7024ba6a17205c978bf78bd4396aeb868b585db2f26f13fa8-runc.E97mS7.mount: Deactivated successfully. Feb 12 19:17:18.484028 kubelet[2109]: I0212 19:17:18.483998 2109 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:18.962000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:18.962000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:18.962000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000ae2ca0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:18.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:18.962000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000051b90 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:18.962000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:19.142000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:19.142000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004698cf0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:17:19.142000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:19.142000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:19.142000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=4004698d50 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:17:19.142000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:19.179000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:19.179000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=4004699890 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:17:19.179000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:19.180000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:19.180000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4b a1=400b0edae0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:17:19.180000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:19.182000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:19.182000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=400b0edd20 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:17:19.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:19.182000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:19.182000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=4004699e60 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:17:19.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:17:19.340861 kubelet[2109]: E0212 19:17:19.340806 2109 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-d216911d7c\" not found" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:19.354194 kubelet[2109]: I0212 19:17:19.354159 2109 apiserver.go:52] "Watching apiserver" Feb 12 19:17:19.425449 kubelet[2109]: I0212 19:17:19.425389 2109 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:19.460811 kubelet[2109]: I0212 19:17:19.460781 2109 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:17:19.498605 kubelet[2109]: I0212 19:17:19.498576 2109 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:17:21.507707 kubelet[2109]: W0212 19:17:21.507673 2109 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:17:22.422830 systemd[1]: Reloading. Feb 12 19:17:22.511054 /usr/lib/systemd/system-generators/torcx-generator[2403]: time="2024-02-12T19:17:22Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:17:22.511433 /usr/lib/systemd/system-generators/torcx-generator[2403]: time="2024-02-12T19:17:22Z" level=info msg="torcx already run" Feb 12 19:17:22.585855 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:17:22.585873 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:17:22.605334 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:17:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696612 kernel: kauditd_printk_skb: 356 callbacks suppressed Feb 12 19:17:22.696754 kernel: audit: type=1400 audit(1707765442.690:707): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734954 kernel: audit: type=1400 audit(1707765442.690:708): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.754240 kernel: audit: type=1400 audit(1707765442.690:709): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.781040 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:17:22.781163 kernel: audit: type=1400 audit(1707765442.690:710): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.781193 kernel: audit: audit_lost=3 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:17:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.781741 kernel: audit: type=1400 audit(1707765442.690:711): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.806588 kernel: audit: backlog limit exceeded Feb 12 19:17:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.830199 kernel: audit: type=1400 audit(1707765442.690:712): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.830298 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:17:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.690000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.690000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696000 audit: BPF prog-id=92 op=LOAD Feb 12 19:17:22.696000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:17:22.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.696000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit: BPF prog-id=93 op=LOAD Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit: BPF prog-id=94 op=LOAD Feb 12 19:17:22.714000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:17:22.714000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.714000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit: BPF prog-id=95 op=LOAD Feb 12 19:17:22.734000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.734000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.753000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.753000 audit: BPF prog-id=96 op=LOAD Feb 12 19:17:22.753000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.755000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.810000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:17:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.810000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit: BPF prog-id=98 op=LOAD Feb 12 19:17:22.836000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit: BPF prog-id=99 op=LOAD Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.836000 audit: BPF prog-id=100 op=LOAD Feb 12 19:17:22.836000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:17:22.836000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit: BPF prog-id=101 op=LOAD Feb 12 19:17:22.837000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.837000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit: BPF prog-id=102 op=LOAD Feb 12 19:17:22.838000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit: BPF prog-id=103 op=LOAD Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.838000 audit: BPF prog-id=104 op=LOAD Feb 12 19:17:22.838000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:17:22.838000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.839000 audit: BPF prog-id=105 op=LOAD Feb 12 19:17:22.839000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:17:22.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.840000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.840000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.841000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.841000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.841000 audit: BPF prog-id=106 op=LOAD Feb 12 19:17:22.841000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.842000 audit: BPF prog-id=107 op=LOAD Feb 12 19:17:22.842000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.843000 audit: BPF prog-id=108 op=LOAD Feb 12 19:17:22.843000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit: BPF prog-id=109 op=LOAD Feb 12 19:17:22.844000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit: BPF prog-id=110 op=LOAD Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.844000 audit: BPF prog-id=111 op=LOAD Feb 12 19:17:22.844000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:17:22.844000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.845000 audit: BPF prog-id=112 op=LOAD Feb 12 19:17:22.845000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:17:22.866423 kubelet[2109]: I0212 19:17:22.864374 2109 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:17:22.864469 systemd[1]: Stopping kubelet.service... Feb 12 19:17:22.886184 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:17:22.886394 systemd[1]: Stopped kubelet.service. Feb 12 19:17:22.885000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:22.888000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:22.888676 systemd[1]: Started kubelet.service. Feb 12 19:17:22.958295 kubelet[2463]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:17:22.958643 kubelet[2463]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:17:22.958692 kubelet[2463]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:17:22.958855 kubelet[2463]: I0212 19:17:22.958816 2463 server.go:199] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:17:22.963906 kubelet[2463]: I0212 19:17:22.963833 2463 server.go:415] "Kubelet version" kubeletVersion="v1.27.2" Feb 12 19:17:22.963906 kubelet[2463]: I0212 19:17:22.963891 2463 server.go:417] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:17:22.964124 kubelet[2463]: I0212 19:17:22.964101 2463 server.go:837] "Client rotation is on, will bootstrap in background" Feb 12 19:17:22.965555 kubelet[2463]: I0212 19:17:22.965532 2463 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:17:22.969655 kubelet[2463]: W0212 19:17:22.969636 2463 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:17:22.970396 kubelet[2463]: I0212 19:17:22.970379 2463 server.go:662] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:17:22.970651 kubelet[2463]: I0212 19:17:22.970640 2463 container_manager_linux.go:266] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:17:22.970806 kubelet[2463]: I0212 19:17:22.970793 2463 container_manager_linux.go:271] "Creating Container Manager object based on Node Config" nodeConfig={RuntimeCgroupsName: SystemCgroupsName: KubeletCgroupsName: KubeletOOMScoreAdj:-999 ContainerRuntime: CgroupsPerQOS:true CgroupRoot:/ CgroupDriver:systemd KubeletRootDir:/var/lib/kubelet ProtectKernelDefaults:false NodeAllocatableConfig:{KubeReservedCgroupName: SystemReservedCgroupName: ReservedSystemCPUs: EnforceNodeAllocatable:map[pods:{}] KubeReserved:map[] SystemReserved:map[] HardEvictionThresholds:[{Signal:nodefs.available Operator:LessThan Value:{Quantity: Percentage:0.1} GracePeriod:0s MinReclaim:} {Signal:nodefs.inodesFree Operator:LessThan Value:{Quantity: Percentage:0.05} GracePeriod:0s MinReclaim:} {Signal:imagefs.available Operator:LessThan Value:{Quantity: Percentage:0.15} GracePeriod:0s MinReclaim:} {Signal:memory.available Operator:LessThan Value:{Quantity:100Mi Percentage:0} GracePeriod:0s MinReclaim:}]} QOSReserved:map[] CPUManagerPolicy:none CPUManagerPolicyOptions:map[] TopologyManagerScope:container CPUManagerReconcilePeriod:10s ExperimentalMemoryManagerPolicy:None ExperimentalMemoryManagerReservedMemory:[] PodPidsLimit:-1 EnforceCPULimits:true CPUCFSQuotaPeriod:100ms TopologyManagerPolicy:none ExperimentalTopologyManagerPolicyOptions:map[]} Feb 12 19:17:22.971073 kubelet[2463]: I0212 19:17:22.971057 2463 topology_manager.go:136] "Creating topology manager with policy per scope" topologyPolicyName="none" topologyScopeName="container" Feb 12 19:17:22.971433 kubelet[2463]: I0212 19:17:22.971421 2463 container_manager_linux.go:302] "Creating device plugin manager" Feb 12 19:17:22.971539 kubelet[2463]: I0212 19:17:22.971530 2463 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:17:22.971773 kubelet[2463]: I0212 19:17:22.971192 2463 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:17:22.976140 kubelet[2463]: I0212 19:17:22.976119 2463 kubelet.go:405] "Attempting to sync node with API server" Feb 12 19:17:22.976268 kubelet[2463]: I0212 19:17:22.976258 2463 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:17:22.976350 kubelet[2463]: I0212 19:17:22.976340 2463 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:17:22.976423 kubelet[2463]: I0212 19:17:22.976413 2463 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:17:22.986388 kubelet[2463]: I0212 19:17:22.986354 2463 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:17:22.986875 kubelet[2463]: I0212 19:17:22.986853 2463 server.go:1168] "Started kubelet" Feb 12 19:17:22.992000 audit[2463]: AVC avc: denied { mac_admin } for pid=2463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.992000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:22.992000 audit[2463]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=40007af2c0 a1=4000d8bbf0 a2=40007af290 a3=25 items=0 ppid=1 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:22.992000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:22.993462 kubelet[2463]: I0212 19:17:22.993445 2463 kubelet.go:1355] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:17:22.992000 audit[2463]: AVC avc: denied { mac_admin } for pid=2463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:22.992000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:22.992000 audit[2463]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=400034b1a0 a1=4000d8bc08 a2=40007af350 a3=25 items=0 ppid=1 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:22.992000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:22.993945 kubelet[2463]: I0212 19:17:22.993932 2463 kubelet.go:1359] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:17:22.994029 kubelet[2463]: I0212 19:17:22.994020 2463 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:17:22.996244 kubelet[2463]: I0212 19:17:22.996216 2463 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:17:22.996867 kubelet[2463]: I0212 19:17:22.996845 2463 server.go:461] "Adding debug handlers to kubelet server" Feb 12 19:17:22.998918 kubelet[2463]: I0212 19:17:22.998900 2463 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:17:23.008335 kubelet[2463]: I0212 19:17:23.008309 2463 volume_manager.go:284] "Starting Kubelet Volume Manager" Feb 12 19:17:23.008831 kubelet[2463]: I0212 19:17:23.008813 2463 desired_state_of_world_populator.go:145] "Desired state populator starts to run" Feb 12 19:17:23.016314 kubelet[2463]: E0212 19:17:23.016292 2463 cri_stats_provider.go:455] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:17:23.016453 kubelet[2463]: E0212 19:17:23.016443 2463 kubelet.go:1400] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:17:23.040398 kubelet[2463]: I0212 19:17:23.040121 2463 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv4 Feb 12 19:17:23.042492 kubelet[2463]: I0212 19:17:23.042156 2463 kubelet_network_linux.go:63] "Initialized iptables rules." protocol=IPv6 Feb 12 19:17:23.042492 kubelet[2463]: I0212 19:17:23.042191 2463 status_manager.go:207] "Starting to sync pod status with apiserver" Feb 12 19:17:23.042492 kubelet[2463]: I0212 19:17:23.042216 2463 kubelet.go:2257] "Starting kubelet main sync loop" Feb 12 19:17:23.044579 kubelet[2463]: E0212 19:17:23.042301 2463 kubelet.go:2281] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:17:23.105458 kubelet[2463]: I0212 19:17:23.105433 2463 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:17:23.105655 kubelet[2463]: I0212 19:17:23.105645 2463 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:17:23.105765 kubelet[2463]: I0212 19:17:23.105755 2463 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:17:23.106036 kubelet[2463]: I0212 19:17:23.106025 2463 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:17:23.106128 kubelet[2463]: I0212 19:17:23.106118 2463 state_mem.go:96] "Updated CPUSet assignments" assignments=map[] Feb 12 19:17:23.106199 kubelet[2463]: I0212 19:17:23.106190 2463 policy_none.go:49] "None policy: Start" Feb 12 19:17:23.107184 kubelet[2463]: I0212 19:17:23.107169 2463 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:17:23.107319 kubelet[2463]: I0212 19:17:23.107309 2463 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:17:23.107560 kubelet[2463]: I0212 19:17:23.107550 2463 state_mem.go:75] "Updated machine memory state" Feb 12 19:17:23.111748 kubelet[2463]: I0212 19:17:23.111706 2463 manager.go:455] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:17:23.111000 audit[2463]: AVC avc: denied { mac_admin } for pid=2463 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:23.111000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:17:23.111000 audit[2463]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000f51080 a1=4000d22fd8 a2=4000f51050 a3=25 items=0 ppid=1 pid=2463 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:23.111000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:17:23.112661 kubelet[2463]: I0212 19:17:23.112648 2463 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:17:23.113010 kubelet[2463]: I0212 19:17:23.112998 2463 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:17:23.114863 kubelet[2463]: I0212 19:17:23.114841 2463 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.144290 kubelet[2463]: I0212 19:17:23.144249 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:23.144579 kubelet[2463]: I0212 19:17:23.144567 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:23.144710 kubelet[2463]: I0212 19:17:23.144700 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:23.170837 kubelet[2463]: W0212 19:17:23.170811 2463 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:17:23.171075 kubelet[2463]: E0212 19:17:23.171053 2463 kubelet.go:1856] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-d216911d7c\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.171546 kubelet[2463]: W0212 19:17:23.171521 2463 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:17:23.171876 kubelet[2463]: W0212 19:17:23.171862 2463 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:17:23.177521 kubelet[2463]: I0212 19:17:23.177486 2463 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.177763 kubelet[2463]: I0212 19:17:23.177753 2463 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.309790 kubelet[2463]: I0212 19:17:23.309761 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/05c3a2772c7ac5aada9716666f9dfc77-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-d216911d7c\" (UID: \"05c3a2772c7ac5aada9716666f9dfc77\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.310022 kubelet[2463]: I0212 19:17:23.309988 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/05c3a2772c7ac5aada9716666f9dfc77-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-d216911d7c\" (UID: \"05c3a2772c7ac5aada9716666f9dfc77\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.310120 kubelet[2463]: I0212 19:17:23.310111 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.310222 kubelet[2463]: I0212 19:17:23.310214 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/6d0854e4c13fef083f7f4526911aae63-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-d216911d7c\" (UID: \"6d0854e4c13fef083f7f4526911aae63\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.310330 kubelet[2463]: I0212 19:17:23.310321 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/05c3a2772c7ac5aada9716666f9dfc77-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-d216911d7c\" (UID: \"05c3a2772c7ac5aada9716666f9dfc77\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.310429 kubelet[2463]: I0212 19:17:23.310420 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.310538 kubelet[2463]: I0212 19:17:23.310529 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.310645 kubelet[2463]: I0212 19:17:23.310636 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.310791 kubelet[2463]: I0212 19:17:23.310781 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e3508d7c48bf966b9d65c97b3dca7eaf-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-d216911d7c\" (UID: \"e3508d7c48bf966b9d65c97b3dca7eaf\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" Feb 12 19:17:23.987842 kubelet[2463]: I0212 19:17:23.987798 2463 apiserver.go:52] "Watching apiserver" Feb 12 19:17:24.009326 kubelet[2463]: I0212 19:17:24.009300 2463 desired_state_of_world_populator.go:153] "Finished populating initial desired state of world" Feb 12 19:17:24.013666 kubelet[2463]: I0212 19:17:24.013620 2463 reconciler.go:41] "Reconciler: start to sync state" Feb 12 19:17:24.104396 kubelet[2463]: I0212 19:17:24.104366 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-d216911d7c" podStartSLOduration=1.104315271 podCreationTimestamp="2024-02-12 19:17:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:24.070294999 +0000 UTC m=+1.173484006" watchObservedRunningTime="2024-02-12 19:17:24.104315271 +0000 UTC m=+1.207504278" Feb 12 19:17:24.131467 kubelet[2463]: I0212 19:17:24.131426 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-d216911d7c" podStartSLOduration=1.131387544 podCreationTimestamp="2024-02-12 19:17:23 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:24.105601764 +0000 UTC m=+1.208790771" watchObservedRunningTime="2024-02-12 19:17:24.131387544 +0000 UTC m=+1.234576551" Feb 12 19:17:24.179471 kubelet[2463]: I0212 19:17:24.179441 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-d216911d7c" podStartSLOduration=3.1793955289999998 podCreationTimestamp="2024-02-12 19:17:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:24.132068709 +0000 UTC m=+1.235257716" watchObservedRunningTime="2024-02-12 19:17:24.179395529 +0000 UTC m=+1.282584496" Feb 12 19:17:26.401926 sudo[1694]: pam_unix(sudo:session): session closed for user root Feb 12 19:17:26.401000 audit[1694]: USER_END pid=1694 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:17:26.401000 audit[1694]: CRED_DISP pid=1694 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:17:26.472387 sshd[1691]: pam_unix(sshd:session): session closed for user core Feb 12 19:17:26.472000 audit[1691]: USER_END pid=1691 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:17:26.472000 audit[1691]: CRED_DISP pid=1691 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:17:26.474993 systemd-logind[1334]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:17:26.475620 systemd[1]: sshd@6-10.200.20.38:22-10.200.12.6:43854.service: Deactivated successfully. Feb 12 19:17:26.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.38:22-10.200.12.6:43854 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:17:26.476401 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:17:26.476583 systemd[1]: session-9.scope: Consumed 5.009s CPU time. Feb 12 19:17:26.476911 systemd-logind[1334]: Removed session 9. Feb 12 19:17:33.027000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:17:33.035742 kernel: kauditd_printk_skb: 257 callbacks suppressed Feb 12 19:17:33.035809 kernel: audit: type=1400 audit(1707765453.027:959): avc: denied { watch } for pid=2347 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521035 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:17:33.027000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001118b40 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:33.100945 kernel: audit: type=1300 audit(1707765453.027:959): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001118b40 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:33.027000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:33.132989 kernel: audit: type=1327 audit(1707765453.027:959): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:33.704000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:33.704000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001398040 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:33.763793 kernel: audit: type=1400 audit(1707765453.704:960): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:33.763924 kernel: audit: type=1300 audit(1707765453.704:960): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001398040 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:33.704000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:33.794335 kernel: audit: type=1327 audit(1707765453.704:960): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:33.710000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:33.820166 kernel: audit: type=1400 audit(1707765453.710:961): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:33.820310 kernel: audit: type=1300 audit(1707765453.710:961): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001398180 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:33.710000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001398180 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:33.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:33.882450 kernel: audit: type=1327 audit(1707765453.710:961): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:33.710000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:33.910495 kernel: audit: type=1400 audit(1707765453.710:962): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:33.710000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40013982e0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:33.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:33.710000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:17:33.710000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400137fa60 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:17:33.710000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:17:34.629618 kubelet[2463]: I0212 19:17:34.629595 2463 kuberuntime_manager.go:1460] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:17:34.630430 env[1346]: time="2024-02-12T19:17:34.630389914Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:17:34.630898 kubelet[2463]: I0212 19:17:34.630880 2463 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:17:35.529274 kubelet[2463]: I0212 19:17:35.529242 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:35.534166 systemd[1]: Created slice kubepods-besteffort-pod201ea83d_e101_4518_99fa_211d0ff4d671.slice. Feb 12 19:17:35.622616 kubelet[2463]: I0212 19:17:35.622581 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:35.627517 systemd[1]: Created slice kubepods-besteffort-pod452d2214_f40b_4306_9440_07c6dc76096b.slice. Feb 12 19:17:35.672551 kubelet[2463]: I0212 19:17:35.672511 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/201ea83d-e101-4518-99fa-211d0ff4d671-xtables-lock\") pod \"kube-proxy-hfqj9\" (UID: \"201ea83d-e101-4518-99fa-211d0ff4d671\") " pod="kube-system/kube-proxy-hfqj9" Feb 12 19:17:35.672551 kubelet[2463]: I0212 19:17:35.672555 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/201ea83d-e101-4518-99fa-211d0ff4d671-lib-modules\") pod \"kube-proxy-hfqj9\" (UID: \"201ea83d-e101-4518-99fa-211d0ff4d671\") " pod="kube-system/kube-proxy-hfqj9" Feb 12 19:17:35.672931 kubelet[2463]: I0212 19:17:35.672583 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/201ea83d-e101-4518-99fa-211d0ff4d671-kube-proxy\") pod \"kube-proxy-hfqj9\" (UID: \"201ea83d-e101-4518-99fa-211d0ff4d671\") " pod="kube-system/kube-proxy-hfqj9" Feb 12 19:17:35.672931 kubelet[2463]: I0212 19:17:35.672603 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zcn94\" (UniqueName: \"kubernetes.io/projected/201ea83d-e101-4518-99fa-211d0ff4d671-kube-api-access-zcn94\") pod \"kube-proxy-hfqj9\" (UID: \"201ea83d-e101-4518-99fa-211d0ff4d671\") " pod="kube-system/kube-proxy-hfqj9" Feb 12 19:17:35.773215 kubelet[2463]: I0212 19:17:35.773181 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-tvhpz\" (UniqueName: \"kubernetes.io/projected/452d2214-f40b-4306-9440-07c6dc76096b-kube-api-access-tvhpz\") pod \"tigera-operator-7ff8dc855-ltchf\" (UID: \"452d2214-f40b-4306-9440-07c6dc76096b\") " pod="tigera-operator/tigera-operator-7ff8dc855-ltchf" Feb 12 19:17:35.774147 kubelet[2463]: I0212 19:17:35.774120 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/452d2214-f40b-4306-9440-07c6dc76096b-var-lib-calico\") pod \"tigera-operator-7ff8dc855-ltchf\" (UID: \"452d2214-f40b-4306-9440-07c6dc76096b\") " pod="tigera-operator/tigera-operator-7ff8dc855-ltchf" Feb 12 19:17:35.841640 env[1346]: time="2024-02-12T19:17:35.841226983Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hfqj9,Uid:201ea83d-e101-4518-99fa-211d0ff4d671,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:35.885841 env[1346]: time="2024-02-12T19:17:35.885703650Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:35.885841 env[1346]: time="2024-02-12T19:17:35.885764287Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:35.885841 env[1346]: time="2024-02-12T19:17:35.885775047Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:35.886468 env[1346]: time="2024-02-12T19:17:35.886375262Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec928ee6e6596dd5bfb8b2d06ecedd53f39acb6fa6960c4e3cee3962bc0b3324 pid=2547 runtime=io.containerd.runc.v2 Feb 12 19:17:35.902913 systemd[1]: Started cri-containerd-ec928ee6e6596dd5bfb8b2d06ecedd53f39acb6fa6960c4e3cee3962bc0b3324.scope. Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.909000 audit: BPF prog-id=113 op=LOAD Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2547 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:35.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393238656536653635393664643562666238623264303665636564 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2547 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:35.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393238656536653635393664643562666238623264303665636564 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit: BPF prog-id=114 op=LOAD Feb 12 19:17:35.910000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2547 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:35.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393238656536653635393664643562666238623264303665636564 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit: BPF prog-id=115 op=LOAD Feb 12 19:17:35.910000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2547 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:35.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393238656536653635393664643562666238623264303665636564 Feb 12 19:17:35.910000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:17:35.910000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { perfmon } for pid=2558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit[2558]: AVC avc: denied { bpf } for pid=2558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:35.910000 audit: BPF prog-id=116 op=LOAD Feb 12 19:17:35.910000 audit[2558]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2547 pid=2558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:35.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563393238656536653635393664643562666238623264303665636564 Feb 12 19:17:35.923495 env[1346]: time="2024-02-12T19:17:35.923450511Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-hfqj9,Uid:201ea83d-e101-4518-99fa-211d0ff4d671,Namespace:kube-system,Attempt:0,} returns sandbox id \"ec928ee6e6596dd5bfb8b2d06ecedd53f39acb6fa6960c4e3cee3962bc0b3324\"" Feb 12 19:17:35.926705 env[1346]: time="2024-02-12T19:17:35.926623061Z" level=info msg="CreateContainer within sandbox \"ec928ee6e6596dd5bfb8b2d06ecedd53f39acb6fa6960c4e3cee3962bc0b3324\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:17:35.929866 env[1346]: time="2024-02-12T19:17:35.929835250Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-ltchf,Uid:452d2214-f40b-4306-9440-07c6dc76096b,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:17:36.007761 env[1346]: time="2024-02-12T19:17:36.007652442Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:36.007761 env[1346]: time="2024-02-12T19:17:36.007693521Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:36.007978 env[1346]: time="2024-02-12T19:17:36.007938711Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:36.008259 env[1346]: time="2024-02-12T19:17:36.008205460Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/57664a578a54cf1d71ce73932e73181a4093a2017bd2e209bfbddc5c5a1707a6 pid=2589 runtime=io.containerd.runc.v2 Feb 12 19:17:36.016464 env[1346]: time="2024-02-12T19:17:36.016419732Z" level=info msg="CreateContainer within sandbox \"ec928ee6e6596dd5bfb8b2d06ecedd53f39acb6fa6960c4e3cee3962bc0b3324\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"493a7af7c6234d6482ae00b392f6f490c5262d5f02570edb17c892919bd1ad77\"" Feb 12 19:17:36.017483 env[1346]: time="2024-02-12T19:17:36.017455771Z" level=info msg="StartContainer for \"493a7af7c6234d6482ae00b392f6f490c5262d5f02570edb17c892919bd1ad77\"" Feb 12 19:17:36.021733 systemd[1]: Started cri-containerd-57664a578a54cf1d71ce73932e73181a4093a2017bd2e209bfbddc5c5a1707a6.scope. Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.037000 audit: BPF prog-id=117 op=LOAD Feb 12 19:17:36.038000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.038000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2589 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537363634613537386135346366316437316365373339333265373331 Feb 12 19:17:36.038000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.038000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2589 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.038000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537363634613537386135346366316437316365373339333265373331 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit: BPF prog-id=118 op=LOAD Feb 12 19:17:36.039000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2589 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537363634613537386135346366316437316365373339333265373331 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.039000 audit: BPF prog-id=119 op=LOAD Feb 12 19:17:36.039000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2589 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.039000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537363634613537386135346366316437316365373339333265373331 Feb 12 19:17:36.040000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:17:36.040000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { perfmon } for pid=2599 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit[2599]: AVC avc: denied { bpf } for pid=2599 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.040000 audit: BPF prog-id=120 op=LOAD Feb 12 19:17:36.040000 audit[2599]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2589 pid=2599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3537363634613537386135346366316437316365373339333265373331 Feb 12 19:17:36.055592 systemd[1]: Started cri-containerd-493a7af7c6234d6482ae00b392f6f490c5262d5f02570edb17c892919bd1ad77.scope. Feb 12 19:17:36.073604 env[1346]: time="2024-02-12T19:17:36.073555650Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-7ff8dc855-ltchf,Uid:452d2214-f40b-4306-9440-07c6dc76096b,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"57664a578a54cf1d71ce73932e73181a4093a2017bd2e209bfbddc5c5a1707a6\"" Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2547 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336137616637633632333464363438326165303062333932663666 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit: BPF prog-id=121 op=LOAD Feb 12 19:17:36.073000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2547 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336137616637633632333464363438326165303062333932663666 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit: BPF prog-id=122 op=LOAD Feb 12 19:17:36.073000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2547 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336137616637633632333464363438326165303062333932663666 Feb 12 19:17:36.073000 audit: BPF prog-id=122 op=UNLOAD Feb 12 19:17:36.073000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { perfmon } for pid=2618 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit[2618]: AVC avc: denied { bpf } for pid=2618 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:36.073000 audit: BPF prog-id=123 op=LOAD Feb 12 19:17:36.073000 audit[2618]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2547 pid=2618 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.073000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336137616637633632333464363438326165303062333932663666 Feb 12 19:17:36.089551 env[1346]: time="2024-02-12T19:17:36.089491894Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:17:36.095262 env[1346]: time="2024-02-12T19:17:36.095155908Z" level=info msg="StartContainer for \"493a7af7c6234d6482ae00b392f6f490c5262d5f02570edb17c892919bd1ad77\" returns successfully" Feb 12 19:17:36.121212 kubelet[2463]: I0212 19:17:36.121175 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-hfqj9" podStartSLOduration=1.1211399499999999 podCreationTimestamp="2024-02-12 19:17:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:17:36.1209002 +0000 UTC m=+13.224089207" watchObservedRunningTime="2024-02-12 19:17:36.12113995 +0000 UTC m=+13.224328957" Feb 12 19:17:36.164000 audit[2677]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2677 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.164000 audit[2677]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff7085140 a2=0 a3=ffffa5fe16c0 items=0 ppid=2641 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.164000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:17:36.166000 audit[2678]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2678 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.166000 audit[2678]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff60e8290 a2=0 a3=ffff9c2d96c0 items=0 ppid=2641 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.166000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:17:36.167000 audit[2679]: NETFILTER_CFG table=nat:43 family=2 entries=1 op=nft_register_chain pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.167000 audit[2679]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd8f3da0 a2=0 a3=ffffb503b6c0 items=0 ppid=2641 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.167000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:17:36.168000 audit[2680]: NETFILTER_CFG table=filter:44 family=2 entries=1 op=nft_register_chain pid=2680 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.168000 audit[2680]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffdcb45b90 a2=0 a3=ffffa90946c0 items=0 ppid=2641 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.168000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:17:36.170000 audit[2681]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2681 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.170000 audit[2681]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffa02e550 a2=0 a3=ffff866c16c0 items=0 ppid=2641 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.170000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:17:36.172000 audit[2682]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2682 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.172000 audit[2682]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffef6bbdc0 a2=0 a3=ffff8af5e6c0 items=0 ppid=2641 pid=2682 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.172000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:17:36.263000 audit[2683]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.263000 audit[2683]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffe4189740 a2=0 a3=ffffad2d96c0 items=0 ppid=2641 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.263000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:17:36.266000 audit[2685]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2685 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.266000 audit[2685]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc3defb70 a2=0 a3=ffffb76c26c0 items=0 ppid=2641 pid=2685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.266000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:17:36.269000 audit[2688]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2688 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.269000 audit[2688]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffd220e540 a2=0 a3=ffffbc7e06c0 items=0 ppid=2641 pid=2688 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.269000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:17:36.270000 audit[2689]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.270000 audit[2689]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd7255700 a2=0 a3=ffffb28466c0 items=0 ppid=2641 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.270000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:17:36.272000 audit[2691]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2691 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.272000 audit[2691]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffff6c25be0 a2=0 a3=ffff8bfe16c0 items=0 ppid=2641 pid=2691 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.272000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:17:36.274000 audit[2692]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.274000 audit[2692]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea01cda0 a2=0 a3=ffffb506b6c0 items=0 ppid=2641 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.274000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:17:36.277000 audit[2694]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2694 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.277000 audit[2694]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff1b2d870 a2=0 a3=ffff8e5266c0 items=0 ppid=2641 pid=2694 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.277000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:17:36.281000 audit[2697]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2697 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.281000 audit[2697]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcfdcab80 a2=0 a3=ffff955576c0 items=0 ppid=2641 pid=2697 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.281000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:17:36.283000 audit[2698]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.283000 audit[2698]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffeb658b90 a2=0 a3=ffff8ffc26c0 items=0 ppid=2641 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.283000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:17:36.285000 audit[2700]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2700 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.285000 audit[2700]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd004e800 a2=0 a3=ffffbb1a46c0 items=0 ppid=2641 pid=2700 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.285000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:17:36.286000 audit[2701]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.286000 audit[2701]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff0a9fbe0 a2=0 a3=ffff9c7b26c0 items=0 ppid=2641 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.286000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:17:36.288000 audit[2703]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2703 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.288000 audit[2703]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe0449520 a2=0 a3=ffff883816c0 items=0 ppid=2641 pid=2703 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.288000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:17:36.291000 audit[2706]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2706 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.291000 audit[2706]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffffefb01b0 a2=0 a3=ffff8ef6b6c0 items=0 ppid=2641 pid=2706 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:17:36.294000 audit[2709]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2709 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.294000 audit[2709]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd61aab20 a2=0 a3=ffffa33716c0 items=0 ppid=2641 pid=2709 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:17:36.295000 audit[2710]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2710 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.295000 audit[2710]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe0805c90 a2=0 a3=ffffbea4d6c0 items=0 ppid=2641 pid=2710 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.295000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:17:36.297000 audit[2712]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2712 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.297000 audit[2712]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffea871ac0 a2=0 a3=ffffb507f6c0 items=0 ppid=2641 pid=2712 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.297000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:17:36.300000 audit[2715]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.300000 audit[2715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffe48b4f20 a2=0 a3=ffffa70986c0 items=0 ppid=2641 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.300000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:17:36.304000 audit[2720]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.304000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffea3bda50 a2=0 a3=ffff9cb0c6c0 items=0 ppid=2641 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.304000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:17:36.306000 audit[2722]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:17:36.306000 audit[2722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffdbb74c10 a2=0 a3=ffffa76b66c0 items=0 ppid=2641 pid=2722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.306000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:17:36.413000 audit[2724]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:36.413000 audit[2724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd7b03290 a2=0 a3=ffffb50b06c0 items=0 ppid=2641 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.413000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:36.464000 audit[2724]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2724 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:36.464000 audit[2724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd7b03290 a2=0 a3=ffffb50b06c0 items=0 ppid=2641 pid=2724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.464000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:36.465000 audit[2729]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2729 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.465000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc6c59a20 a2=0 a3=ffffb02556c0 items=0 ppid=2641 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.465000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:17:36.468000 audit[2731]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2731 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.468000 audit[2731]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffffad9570 a2=0 a3=ffff927ad6c0 items=0 ppid=2641 pid=2731 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.468000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:17:36.471000 audit[2734]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.471000 audit[2734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffe15e6cc0 a2=0 a3=ffffb812c6c0 items=0 ppid=2641 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.471000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:17:36.472000 audit[2735]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2735 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.472000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6045120 a2=0 a3=ffffb317a6c0 items=0 ppid=2641 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.472000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:17:36.474000 audit[2737]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.474000 audit[2737]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc164ac40 a2=0 a3=ffffa53e36c0 items=0 ppid=2641 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.474000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:17:36.475000 audit[2738]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2738 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.475000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff1db7660 a2=0 a3=ffff9afb16c0 items=0 ppid=2641 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.475000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:17:36.478000 audit[2740]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2740 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.478000 audit[2740]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=fffff74aa860 a2=0 a3=ffffbab9f6c0 items=0 ppid=2641 pid=2740 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.478000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:17:36.480000 audit[2743]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.480000 audit[2743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=fffffe355540 a2=0 a3=ffff894ef6c0 items=0 ppid=2641 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.480000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:17:36.482000 audit[2744]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2744 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.482000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff71c43e0 a2=0 a3=ffff98bb16c0 items=0 ppid=2641 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.482000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:17:36.484000 audit[2746]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.484000 audit[2746]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffea65fd50 a2=0 a3=ffffb440a6c0 items=0 ppid=2641 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.484000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:17:36.485000 audit[2747]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2747 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.485000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd9ad1ee0 a2=0 a3=ffff83fdf6c0 items=0 ppid=2641 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.485000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:17:36.488000 audit[2749]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2749 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.488000 audit[2749]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=fffff7d13d90 a2=0 a3=ffffbb9156c0 items=0 ppid=2641 pid=2749 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.488000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:17:36.491000 audit[2752]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2752 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.491000 audit[2752]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe702b2d0 a2=0 a3=ffffa40d86c0 items=0 ppid=2641 pid=2752 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.491000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:17:36.494000 audit[2755]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.494000 audit[2755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffe47419c0 a2=0 a3=ffffaf0a36c0 items=0 ppid=2641 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.494000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:17:36.495000 audit[2756]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.495000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff2071740 a2=0 a3=ffff828816c0 items=0 ppid=2641 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.495000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:17:36.497000 audit[2758]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2758 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.497000 audit[2758]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffed0e6840 a2=0 a3=ffff9cfb56c0 items=0 ppid=2641 pid=2758 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.497000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:17:36.499000 audit[2761]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.499000 audit[2761]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffedcc9cd0 a2=0 a3=ffff954126c0 items=0 ppid=2641 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.499000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:17:36.500000 audit[2762]: NETFILTER_CFG table=filter:85 family=10 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.500000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffdcfcd160 a2=0 a3=ffff8c4ea6c0 items=0 ppid=2641 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:17:36.503000 audit[2764]: NETFILTER_CFG table=filter:86 family=10 entries=1 op=nft_register_rule pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.503000 audit[2764]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdcac2980 a2=0 a3=ffff812386c0 items=0 ppid=2641 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:17:36.506000 audit[2767]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_rule pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.506000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffcc1590a0 a2=0 a3=ffffa1b0b6c0 items=0 ppid=2641 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:17:36.507000 audit[2768]: NETFILTER_CFG table=nat:88 family=10 entries=1 op=nft_register_chain pid=2768 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.507000 audit[2768]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2990320 a2=0 a3=ffff80c696c0 items=0 ppid=2641 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:17:36.509000 audit[2770]: NETFILTER_CFG table=nat:89 family=10 entries=2 op=nft_register_chain pid=2770 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:17:36.509000 audit[2770]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffdeeb5cb0 a2=0 a3=ffff83d5f6c0 items=0 ppid=2641 pid=2770 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:17:36.511000 audit[2772]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:17:36.511000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffcfc24250 a2=0 a3=ffffa6c336c0 items=0 ppid=2641 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.511000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:36.512000 audit[2772]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:17:36.512000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffcfc24250 a2=0 a3=ffffa6c336c0 items=0 ppid=2641 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:36.512000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:38.551030 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount458324856.mount: Deactivated successfully. Feb 12 19:17:39.727865 env[1346]: time="2024-02-12T19:17:39.727793398Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:39.737628 env[1346]: time="2024-02-12T19:17:39.737589150Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:39.742265 env[1346]: time="2024-02-12T19:17:39.742231575Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:39.747435 env[1346]: time="2024-02-12T19:17:39.747392022Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:39.748216 env[1346]: time="2024-02-12T19:17:39.748188032Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 12 19:17:39.752555 env[1346]: time="2024-02-12T19:17:39.752515789Z" level=info msg="CreateContainer within sandbox \"57664a578a54cf1d71ce73932e73181a4093a2017bd2e209bfbddc5c5a1707a6\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:17:39.800063 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount228292361.mount: Deactivated successfully. Feb 12 19:17:39.804212 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3406040509.mount: Deactivated successfully. Feb 12 19:17:39.821576 env[1346]: time="2024-02-12T19:17:39.821529916Z" level=info msg="CreateContainer within sandbox \"57664a578a54cf1d71ce73932e73181a4093a2017bd2e209bfbddc5c5a1707a6\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f\"" Feb 12 19:17:39.822833 env[1346]: time="2024-02-12T19:17:39.822796948Z" level=info msg="StartContainer for \"a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f\"" Feb 12 19:17:39.844913 systemd[1]: Started cri-containerd-a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f.scope. Feb 12 19:17:39.863548 kernel: kauditd_printk_skb: 315 callbacks suppressed Feb 12 19:17:39.864020 kernel: audit: type=1400 audit(1707765459.857:1057): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.908336 kernel: audit: type=1400 audit(1707765459.857:1058): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.949803 kernel: audit: type=1400 audit(1707765459.857:1059): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.949904 kernel: audit: type=1400 audit(1707765459.857:1060): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.970985 kernel: audit: type=1400 audit(1707765459.857:1061): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.991589 kernel: audit: type=1400 audit(1707765459.857:1062): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:40.015768 kernel: audit: type=1400 audit(1707765459.857:1063): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:40.015924 kernel: audit: type=1400 audit(1707765459.857:1064): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.857000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.857000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:40.053644 kernel: audit: type=1400 audit(1707765459.857:1065): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:40.053708 kernel: audit: type=1400 audit(1707765459.862:1066): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.862000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:40.073995 env[1346]: time="2024-02-12T19:17:40.073950444Z" level=info msg="StartContainer for \"a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f\" returns successfully" Feb 12 19:17:39.862000 audit: BPF prog-id=124 op=LOAD Feb 12 19:17:39.883000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.883000 audit[2781]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2589 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373261316432323139316233636631326130663031363763326233 Feb 12 19:17:39.883000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.883000 audit[2781]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2589 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.883000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373261316432323139316233636631326130663031363763326233 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.884000 audit: BPF prog-id=125 op=LOAD Feb 12 19:17:39.884000 audit[2781]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2589 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.884000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373261316432323139316233636631326130663031363763326233 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit: BPF prog-id=126 op=LOAD Feb 12 19:17:39.907000 audit[2781]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2589 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373261316432323139316233636631326130663031363763326233 Feb 12 19:17:39.907000 audit: BPF prog-id=126 op=UNLOAD Feb 12 19:17:39.907000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { perfmon } for pid=2781 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit[2781]: AVC avc: denied { bpf } for pid=2781 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:39.907000 audit: BPF prog-id=127 op=LOAD Feb 12 19:17:39.907000 audit[2781]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2589 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:39.907000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6136373261316432323139316233636631326130663031363763326233 Feb 12 19:17:43.053588 kubelet[2463]: I0212 19:17:43.053549 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-7ff8dc855-ltchf" podStartSLOduration=4.392714654 podCreationTimestamp="2024-02-12 19:17:35 +0000 UTC" firstStartedPulling="2024-02-12 19:17:36.08783408 +0000 UTC m=+13.191023087" lastFinishedPulling="2024-02-12 19:17:39.748631175 +0000 UTC m=+16.851820182" observedRunningTime="2024-02-12 19:17:40.126695461 +0000 UTC m=+17.229884428" watchObservedRunningTime="2024-02-12 19:17:43.053511749 +0000 UTC m=+20.156700756" Feb 12 19:17:43.254000 audit[2810]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:43.254000 audit[2810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffc38b7890 a2=0 a3=ffffb0f8a6c0 items=0 ppid=2641 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.254000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:43.255000 audit[2810]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:43.255000 audit[2810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffc38b7890 a2=0 a3=ffffb0f8a6c0 items=0 ppid=2641 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.255000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:43.270000 audit[2812]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:43.270000 audit[2812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff72a0140 a2=0 a3=ffffb42986c0 items=0 ppid=2641 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.270000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:43.271000 audit[2812]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:43.271000 audit[2812]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff72a0140 a2=0 a3=ffffb42986c0 items=0 ppid=2641 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.271000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:43.388208 kubelet[2463]: I0212 19:17:43.388094 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:43.393070 systemd[1]: Created slice kubepods-besteffort-pod52ca0511_7915_4e00_8c27_cc64719faa7d.slice. Feb 12 19:17:43.482797 kubelet[2463]: I0212 19:17:43.482759 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:43.488063 systemd[1]: Created slice kubepods-besteffort-pod04c697af_9376_446c_bd89_b215581404a3.slice. Feb 12 19:17:43.526514 kubelet[2463]: I0212 19:17:43.526479 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/52ca0511-7915-4e00-8c27-cc64719faa7d-tigera-ca-bundle\") pod \"calico-typha-694c6db4b9-gtsxm\" (UID: \"52ca0511-7915-4e00-8c27-cc64719faa7d\") " pod="calico-system/calico-typha-694c6db4b9-gtsxm" Feb 12 19:17:43.526764 kubelet[2463]: I0212 19:17:43.526719 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-54dld\" (UniqueName: \"kubernetes.io/projected/52ca0511-7915-4e00-8c27-cc64719faa7d-kube-api-access-54dld\") pod \"calico-typha-694c6db4b9-gtsxm\" (UID: \"52ca0511-7915-4e00-8c27-cc64719faa7d\") " pod="calico-system/calico-typha-694c6db4b9-gtsxm" Feb 12 19:17:43.526826 kubelet[2463]: I0212 19:17:43.526786 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/52ca0511-7915-4e00-8c27-cc64719faa7d-typha-certs\") pod \"calico-typha-694c6db4b9-gtsxm\" (UID: \"52ca0511-7915-4e00-8c27-cc64719faa7d\") " pod="calico-system/calico-typha-694c6db4b9-gtsxm" Feb 12 19:17:43.604161 kubelet[2463]: I0212 19:17:43.604119 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:43.604595 kubelet[2463]: E0212 19:17:43.604572 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8zcl" podUID=09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b Feb 12 19:17:43.627606 kubelet[2463]: I0212 19:17:43.627580 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/04c697af-9376-446c-bd89-b215581404a3-flexvol-driver-host\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.627859 kubelet[2463]: I0212 19:17:43.627840 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/04c697af-9376-446c-bd89-b215581404a3-node-certs\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.627958 kubelet[2463]: I0212 19:17:43.627947 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/04c697af-9376-446c-bd89-b215581404a3-xtables-lock\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.628076 kubelet[2463]: I0212 19:17:43.628063 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/04c697af-9376-446c-bd89-b215581404a3-tigera-ca-bundle\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.628167 kubelet[2463]: I0212 19:17:43.628157 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7xxnm\" (UniqueName: \"kubernetes.io/projected/04c697af-9376-446c-bd89-b215581404a3-kube-api-access-7xxnm\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.628256 kubelet[2463]: I0212 19:17:43.628246 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/04c697af-9376-446c-bd89-b215581404a3-policysync\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.628343 kubelet[2463]: I0212 19:17:43.628334 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/04c697af-9376-446c-bd89-b215581404a3-var-run-calico\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.628428 kubelet[2463]: I0212 19:17:43.628419 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/04c697af-9376-446c-bd89-b215581404a3-cni-net-dir\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.628533 kubelet[2463]: I0212 19:17:43.628523 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/04c697af-9376-446c-bd89-b215581404a3-var-lib-calico\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.628620 kubelet[2463]: I0212 19:17:43.628611 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/04c697af-9376-446c-bd89-b215581404a3-cni-log-dir\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.628710 kubelet[2463]: I0212 19:17:43.628700 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/04c697af-9376-446c-bd89-b215581404a3-cni-bin-dir\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.628822 kubelet[2463]: I0212 19:17:43.628811 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/04c697af-9376-446c-bd89-b215581404a3-lib-modules\") pod \"calico-node-xfvzx\" (UID: \"04c697af-9376-446c-bd89-b215581404a3\") " pod="calico-system/calico-node-xfvzx" Feb 12 19:17:43.696390 env[1346]: time="2024-02-12T19:17:43.696271484Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-694c6db4b9-gtsxm,Uid:52ca0511-7915-4e00-8c27-cc64719faa7d,Namespace:calico-system,Attempt:0,}" Feb 12 19:17:43.729176 kubelet[2463]: I0212 19:17:43.729135 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b-varrun\") pod \"csi-node-driver-d8zcl\" (UID: \"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b\") " pod="calico-system/csi-node-driver-d8zcl" Feb 12 19:17:43.730580 kubelet[2463]: I0212 19:17:43.729332 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b-socket-dir\") pod \"csi-node-driver-d8zcl\" (UID: \"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b\") " pod="calico-system/csi-node-driver-d8zcl" Feb 12 19:17:43.730580 kubelet[2463]: I0212 19:17:43.729685 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b-kubelet-dir\") pod \"csi-node-driver-d8zcl\" (UID: \"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b\") " pod="calico-system/csi-node-driver-d8zcl" Feb 12 19:17:43.730580 kubelet[2463]: I0212 19:17:43.729743 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dt656\" (UniqueName: \"kubernetes.io/projected/09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b-kube-api-access-dt656\") pod \"csi-node-driver-d8zcl\" (UID: \"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b\") " pod="calico-system/csi-node-driver-d8zcl" Feb 12 19:17:43.730580 kubelet[2463]: I0212 19:17:43.729778 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b-registration-dir\") pod \"csi-node-driver-d8zcl\" (UID: \"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b\") " pod="calico-system/csi-node-driver-d8zcl" Feb 12 19:17:43.737576 kubelet[2463]: E0212 19:17:43.737555 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.737781 kubelet[2463]: W0212 19:17:43.737762 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.737880 kubelet[2463]: E0212 19:17:43.737868 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.753324 env[1346]: time="2024-02-12T19:17:43.753249264Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:43.757925 env[1346]: time="2024-02-12T19:17:43.757875623Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:43.758048 env[1346]: time="2024-02-12T19:17:43.757930461Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:43.759394 env[1346]: time="2024-02-12T19:17:43.759336252Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/816dde106473417728740eb0d3a5ee20252b31115dcfe5e93a8b175dad28caea pid=2827 runtime=io.containerd.runc.v2 Feb 12 19:17:43.760823 kubelet[2463]: E0212 19:17:43.760372 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.760823 kubelet[2463]: W0212 19:17:43.760393 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.760823 kubelet[2463]: E0212 19:17:43.760417 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.778488 systemd[1]: Started cri-containerd-816dde106473417728740eb0d3a5ee20252b31115dcfe5e93a8b175dad28caea.scope. Feb 12 19:17:43.792211 env[1346]: time="2024-02-12T19:17:43.792151391Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xfvzx,Uid:04c697af-9376-446c-bd89-b215581404a3,Namespace:calico-system,Attempt:0,}" Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.800000 audit: BPF prog-id=128 op=LOAD Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2827 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366464653130363437333431373732383734306562306433613565 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2827 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366464653130363437333431373732383734306562306433613565 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit: BPF prog-id=129 op=LOAD Feb 12 19:17:43.801000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2827 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366464653130363437333431373732383734306562306433613565 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.801000 audit: BPF prog-id=130 op=LOAD Feb 12 19:17:43.801000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2827 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.801000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366464653130363437333431373732383734306562306433613565 Feb 12 19:17:43.802000 audit: BPF prog-id=130 op=UNLOAD Feb 12 19:17:43.802000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.802000 audit: BPF prog-id=131 op=LOAD Feb 12 19:17:43.802000 audit[2838]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2827 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.802000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3831366464653130363437333431373732383734306562306433613565 Feb 12 19:17:43.821639 env[1346]: time="2024-02-12T19:17:43.821588888Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-694c6db4b9-gtsxm,Uid:52ca0511-7915-4e00-8c27-cc64719faa7d,Namespace:calico-system,Attempt:0,} returns sandbox id \"816dde106473417728740eb0d3a5ee20252b31115dcfe5e93a8b175dad28caea\"" Feb 12 19:17:43.823901 env[1346]: time="2024-02-12T19:17:43.823400785Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:17:43.830430 kubelet[2463]: E0212 19:17:43.830389 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.830430 kubelet[2463]: W0212 19:17:43.830420 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.830430 kubelet[2463]: E0212 19:17:43.830442 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.830783 kubelet[2463]: E0212 19:17:43.830766 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.830843 kubelet[2463]: W0212 19:17:43.830785 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.830843 kubelet[2463]: E0212 19:17:43.830802 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.831020 kubelet[2463]: E0212 19:17:43.831002 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.831020 kubelet[2463]: W0212 19:17:43.831018 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.831084 kubelet[2463]: E0212 19:17:43.831032 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.831256 kubelet[2463]: E0212 19:17:43.831236 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.831256 kubelet[2463]: W0212 19:17:43.831252 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.831333 kubelet[2463]: E0212 19:17:43.831273 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.831489 kubelet[2463]: E0212 19:17:43.831465 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.831489 kubelet[2463]: W0212 19:17:43.831478 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.831585 kubelet[2463]: E0212 19:17:43.831500 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.831770 kubelet[2463]: E0212 19:17:43.831710 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.831770 kubelet[2463]: W0212 19:17:43.831733 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.831770 kubelet[2463]: E0212 19:17:43.831749 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.831999 kubelet[2463]: E0212 19:17:43.831979 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.831999 kubelet[2463]: W0212 19:17:43.831993 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.832141 kubelet[2463]: E0212 19:17:43.832064 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.832181 kubelet[2463]: E0212 19:17:43.832154 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.832181 kubelet[2463]: W0212 19:17:43.832161 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.832300 kubelet[2463]: E0212 19:17:43.832230 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.832339 kubelet[2463]: E0212 19:17:43.832316 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.832339 kubelet[2463]: W0212 19:17:43.832324 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.832456 kubelet[2463]: E0212 19:17:43.832385 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.832491 kubelet[2463]: E0212 19:17:43.832478 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.832491 kubelet[2463]: W0212 19:17:43.832486 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.832611 kubelet[2463]: E0212 19:17:43.832552 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.832650 kubelet[2463]: E0212 19:17:43.832632 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.832650 kubelet[2463]: W0212 19:17:43.832639 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.832798 kubelet[2463]: E0212 19:17:43.832702 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.832846 kubelet[2463]: E0212 19:17:43.832826 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.832846 kubelet[2463]: W0212 19:17:43.832835 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.832893 kubelet[2463]: E0212 19:17:43.832851 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.833071 kubelet[2463]: E0212 19:17:43.833053 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.833071 kubelet[2463]: W0212 19:17:43.833067 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.833134 kubelet[2463]: E0212 19:17:43.833080 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.833264 kubelet[2463]: E0212 19:17:43.833245 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.833264 kubelet[2463]: W0212 19:17:43.833259 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.833329 kubelet[2463]: E0212 19:17:43.833273 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.833448 kubelet[2463]: E0212 19:17:43.833430 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.833448 kubelet[2463]: W0212 19:17:43.833444 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.833580 kubelet[2463]: E0212 19:17:43.833517 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.833615 kubelet[2463]: E0212 19:17:43.833595 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.833615 kubelet[2463]: W0212 19:17:43.833602 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.833756 kubelet[2463]: E0212 19:17:43.833664 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.833801 kubelet[2463]: E0212 19:17:43.833772 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.833801 kubelet[2463]: W0212 19:17:43.833778 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.833899 kubelet[2463]: E0212 19:17:43.833838 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.834038 kubelet[2463]: E0212 19:17:43.834018 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.834038 kubelet[2463]: W0212 19:17:43.834032 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.834105 kubelet[2463]: E0212 19:17:43.834101 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.834224 kubelet[2463]: E0212 19:17:43.834207 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.834224 kubelet[2463]: W0212 19:17:43.834221 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.834284 kubelet[2463]: E0212 19:17:43.834236 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.834748 kubelet[2463]: E0212 19:17:43.834608 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.834748 kubelet[2463]: W0212 19:17:43.834623 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.834748 kubelet[2463]: E0212 19:17:43.834639 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.834862 kubelet[2463]: E0212 19:17:43.834851 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.834862 kubelet[2463]: W0212 19:17:43.834859 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.834905 kubelet[2463]: E0212 19:17:43.834872 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.835800 kubelet[2463]: E0212 19:17:43.835033 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.835800 kubelet[2463]: W0212 19:17:43.835046 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.835800 kubelet[2463]: E0212 19:17:43.835060 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.835800 kubelet[2463]: E0212 19:17:43.835211 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.835800 kubelet[2463]: W0212 19:17:43.835218 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.835800 kubelet[2463]: E0212 19:17:43.835271 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.835800 kubelet[2463]: E0212 19:17:43.835350 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.835800 kubelet[2463]: W0212 19:17:43.835356 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.835800 kubelet[2463]: E0212 19:17:43.835365 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.835800 kubelet[2463]: E0212 19:17:43.835616 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.836052 kubelet[2463]: W0212 19:17:43.835626 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.836052 kubelet[2463]: E0212 19:17:43.835636 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.848298 kubelet[2463]: E0212 19:17:43.848264 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:43.848298 kubelet[2463]: W0212 19:17:43.848298 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:43.848462 kubelet[2463]: E0212 19:17:43.848320 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:43.856858 env[1346]: time="2024-02-12T19:17:43.856775945Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:17:43.857024 env[1346]: time="2024-02-12T19:17:43.857002257Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:17:43.857144 env[1346]: time="2024-02-12T19:17:43.857123053Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:17:43.857466 env[1346]: time="2024-02-12T19:17:43.857375604Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2e81406b04f6eec2ce599aab78f51654f73c43620c0c17c508b01ff5b110a269 pid=2896 runtime=io.containerd.runc.v2 Feb 12 19:17:43.873803 systemd[1]: Started cri-containerd-2e81406b04f6eec2ce599aab78f51654f73c43620c0c17c508b01ff5b110a269.scope. Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.886000 audit: BPF prog-id=132 op=LOAD Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2896 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265383134303662303466366565633263653539396161623738663531 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2896 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265383134303662303466366565633263653539396161623738663531 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit: BPF prog-id=133 op=LOAD Feb 12 19:17:43.887000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2896 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265383134303662303466366565633263653539396161623738663531 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.887000 audit: BPF prog-id=134 op=LOAD Feb 12 19:17:43.887000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2896 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.887000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265383134303662303466366565633263653539396161623738663531 Feb 12 19:17:43.888000 audit: BPF prog-id=134 op=UNLOAD Feb 12 19:17:43.888000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { perfmon } for pid=2905 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit[2905]: AVC avc: denied { bpf } for pid=2905 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:43.888000 audit: BPF prog-id=135 op=LOAD Feb 12 19:17:43.888000 audit[2905]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2896 pid=2905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:43.888000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265383134303662303466366565633263653539396161623738663531 Feb 12 19:17:43.911145 env[1346]: time="2024-02-12T19:17:43.911097856Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-xfvzx,Uid:04c697af-9376-446c-bd89-b215581404a3,Namespace:calico-system,Attempt:0,} returns sandbox id \"2e81406b04f6eec2ce599aab78f51654f73c43620c0c17c508b01ff5b110a269\"" Feb 12 19:17:44.318000 audit[2929]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:44.318000 audit[2929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff4f7a0d0 a2=0 a3=ffffbc3d86c0 items=0 ppid=2641 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:44.318000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:44.320000 audit[2929]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2929 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:17:44.320000 audit[2929]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff4f7a0d0 a2=0 a3=ffffbc3d86c0 items=0 ppid=2641 pid=2929 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:44.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:17:45.043872 kubelet[2463]: E0212 19:17:45.043837 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8zcl" podUID=09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b Feb 12 19:17:45.330209 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2601625700.mount: Deactivated successfully. Feb 12 19:17:46.279119 env[1346]: time="2024-02-12T19:17:46.279076313Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:46.289319 env[1346]: time="2024-02-12T19:17:46.289278578Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:46.295070 env[1346]: time="2024-02-12T19:17:46.295035708Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:46.299746 env[1346]: time="2024-02-12T19:17:46.299696715Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:46.300406 env[1346]: time="2024-02-12T19:17:46.300380813Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 12 19:17:46.302197 env[1346]: time="2024-02-12T19:17:46.302169354Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:17:46.315711 env[1346]: time="2024-02-12T19:17:46.315660150Z" level=info msg="CreateContainer within sandbox \"816dde106473417728740eb0d3a5ee20252b31115dcfe5e93a8b175dad28caea\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:17:46.367929 env[1346]: time="2024-02-12T19:17:46.367873994Z" level=info msg="CreateContainer within sandbox \"816dde106473417728740eb0d3a5ee20252b31115dcfe5e93a8b175dad28caea\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"caa3c91e7266189c85b42e6b52308b040e750c5310bae72b97cb7afdf55a49fb\"" Feb 12 19:17:46.368543 env[1346]: time="2024-02-12T19:17:46.368508173Z" level=info msg="StartContainer for \"caa3c91e7266189c85b42e6b52308b040e750c5310bae72b97cb7afdf55a49fb\"" Feb 12 19:17:46.387554 systemd[1]: Started cri-containerd-caa3c91e7266189c85b42e6b52308b040e750c5310bae72b97cb7afdf55a49fb.scope. Feb 12 19:17:46.437580 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 12 19:17:46.437700 kernel: audit: type=1400 audit(1707765466.410:1117): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.459681 kernel: audit: type=1400 audit(1707765466.410:1118): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.482088 kernel: audit: type=1400 audit(1707765466.410:1119): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.527571 kernel: audit: type=1400 audit(1707765466.410:1120): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.527677 kernel: audit: type=1400 audit(1707765466.410:1121): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.547810 kernel: audit: type=1400 audit(1707765466.410:1122): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.568602 kernel: audit: type=1400 audit(1707765466.410:1123): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.596017 kernel: audit: type=1400 audit(1707765466.410:1124): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.617013 kernel: audit: type=1400 audit(1707765466.410:1125): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.638814 kernel: audit: type=1400 audit(1707765466.410:1126): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.410000 audit: BPF prog-id=136 op=LOAD Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000115b38 a2=10 a3=0 items=0 ppid=2827 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:46.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613363393165373236363138396338356234326536623532333038 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=2827 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:46.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613363393165373236363138396338356234326536623532333038 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.414000 audit: BPF prog-id=137 op=LOAD Feb 12 19:17:46.414000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=2827 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:46.414000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613363393165373236363138396338356234326536623532333038 Feb 12 19:17:46.416000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.416000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.416000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.416000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.416000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.416000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.416000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.416000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.416000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.416000 audit: BPF prog-id=138 op=LOAD Feb 12 19:17:46.416000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=2827 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:46.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613363393165373236363138396338356234326536623532333038 Feb 12 19:17:46.438000 audit: BPF prog-id=138 op=UNLOAD Feb 12 19:17:46.438000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { perfmon } for pid=2940 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit[2940]: AVC avc: denied { bpf } for pid=2940 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:46.438000 audit: BPF prog-id=139 op=LOAD Feb 12 19:17:46.438000 audit[2940]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=2827 pid=2940 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:46.438000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6361613363393165373236363138396338356234326536623532333038 Feb 12 19:17:46.651619 env[1346]: time="2024-02-12T19:17:46.651578187Z" level=info msg="StartContainer for \"caa3c91e7266189c85b42e6b52308b040e750c5310bae72b97cb7afdf55a49fb\" returns successfully" Feb 12 19:17:47.043318 kubelet[2463]: E0212 19:17:47.043003 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8zcl" podUID=09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b Feb 12 19:17:47.151600 kubelet[2463]: I0212 19:17:47.151565 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-694c6db4b9-gtsxm" podStartSLOduration=1.6732118969999998 podCreationTimestamp="2024-02-12 19:17:43 +0000 UTC" firstStartedPulling="2024-02-12 19:17:43.822928681 +0000 UTC m=+20.926117648" lastFinishedPulling="2024-02-12 19:17:46.301235105 +0000 UTC m=+23.404424192" observedRunningTime="2024-02-12 19:17:47.150570112 +0000 UTC m=+24.253759119" watchObservedRunningTime="2024-02-12 19:17:47.151518441 +0000 UTC m=+24.254707448" Feb 12 19:17:47.163939 kubelet[2463]: E0212 19:17:47.163831 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.163939 kubelet[2463]: W0212 19:17:47.163852 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.163939 kubelet[2463]: E0212 19:17:47.163871 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.164287 kubelet[2463]: E0212 19:17:47.164184 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.164287 kubelet[2463]: W0212 19:17:47.164194 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.164287 kubelet[2463]: E0212 19:17:47.164209 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.164554 kubelet[2463]: E0212 19:17:47.164436 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.164554 kubelet[2463]: W0212 19:17:47.164445 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.164554 kubelet[2463]: E0212 19:17:47.164457 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.164823 kubelet[2463]: E0212 19:17:47.164709 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.164823 kubelet[2463]: W0212 19:17:47.164719 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.164823 kubelet[2463]: E0212 19:17:47.164750 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.165070 kubelet[2463]: E0212 19:17:47.164978 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.165070 kubelet[2463]: W0212 19:17:47.164987 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.165070 kubelet[2463]: E0212 19:17:47.164998 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.165357 kubelet[2463]: E0212 19:17:47.165221 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.165357 kubelet[2463]: W0212 19:17:47.165230 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.165357 kubelet[2463]: E0212 19:17:47.165241 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.165593 kubelet[2463]: E0212 19:17:47.165502 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.165593 kubelet[2463]: W0212 19:17:47.165512 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.165593 kubelet[2463]: E0212 19:17:47.165523 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.165844 kubelet[2463]: E0212 19:17:47.165754 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.165844 kubelet[2463]: W0212 19:17:47.165764 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.165844 kubelet[2463]: E0212 19:17:47.165775 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.166095 kubelet[2463]: E0212 19:17:47.165994 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.166095 kubelet[2463]: W0212 19:17:47.166003 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.166095 kubelet[2463]: E0212 19:17:47.166014 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.166336 kubelet[2463]: E0212 19:17:47.166242 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.166336 kubelet[2463]: W0212 19:17:47.166251 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.166336 kubelet[2463]: E0212 19:17:47.166262 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.166564 kubelet[2463]: E0212 19:17:47.166472 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.166564 kubelet[2463]: W0212 19:17:47.166482 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.166564 kubelet[2463]: E0212 19:17:47.166494 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.166805 kubelet[2463]: E0212 19:17:47.166712 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.166805 kubelet[2463]: W0212 19:17:47.166721 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.166805 kubelet[2463]: E0212 19:17:47.166748 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.264398 kubelet[2463]: E0212 19:17:47.264369 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.264398 kubelet[2463]: W0212 19:17:47.264389 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.264594 kubelet[2463]: E0212 19:17:47.264409 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.264594 kubelet[2463]: E0212 19:17:47.264583 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.264594 kubelet[2463]: W0212 19:17:47.264591 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.264667 kubelet[2463]: E0212 19:17:47.264602 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.264774 kubelet[2463]: E0212 19:17:47.264756 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.264774 kubelet[2463]: W0212 19:17:47.264769 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.264858 kubelet[2463]: E0212 19:17:47.264781 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.264963 kubelet[2463]: E0212 19:17:47.264949 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.264963 kubelet[2463]: W0212 19:17:47.264960 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.265043 kubelet[2463]: E0212 19:17:47.264977 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.265125 kubelet[2463]: E0212 19:17:47.265098 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.265125 kubelet[2463]: W0212 19:17:47.265118 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.265125 kubelet[2463]: E0212 19:17:47.265128 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.265267 kubelet[2463]: E0212 19:17:47.265245 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.265267 kubelet[2463]: W0212 19:17:47.265263 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.265348 kubelet[2463]: E0212 19:17:47.265277 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.265434 kubelet[2463]: E0212 19:17:47.265416 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.265434 kubelet[2463]: W0212 19:17:47.265434 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.265512 kubelet[2463]: E0212 19:17:47.265444 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.265761 kubelet[2463]: E0212 19:17:47.265736 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.265849 kubelet[2463]: W0212 19:17:47.265837 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.265919 kubelet[2463]: E0212 19:17:47.265909 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.266196 kubelet[2463]: E0212 19:17:47.266181 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.266279 kubelet[2463]: W0212 19:17:47.266266 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.266351 kubelet[2463]: E0212 19:17:47.266340 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.266568 kubelet[2463]: E0212 19:17:47.266546 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.266568 kubelet[2463]: W0212 19:17:47.266563 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.266670 kubelet[2463]: E0212 19:17:47.266583 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.266786 kubelet[2463]: E0212 19:17:47.266764 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.266786 kubelet[2463]: W0212 19:17:47.266778 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.266860 kubelet[2463]: E0212 19:17:47.266796 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.266946 kubelet[2463]: E0212 19:17:47.266916 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.266946 kubelet[2463]: W0212 19:17:47.266938 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.267005 kubelet[2463]: E0212 19:17:47.266949 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.267124 kubelet[2463]: E0212 19:17:47.267090 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.267124 kubelet[2463]: W0212 19:17:47.267114 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.267124 kubelet[2463]: E0212 19:17:47.267125 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.267393 kubelet[2463]: E0212 19:17:47.267379 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.267468 kubelet[2463]: W0212 19:17:47.267457 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.267534 kubelet[2463]: E0212 19:17:47.267525 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.267814 kubelet[2463]: E0212 19:17:47.267801 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.267890 kubelet[2463]: W0212 19:17:47.267878 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.267949 kubelet[2463]: E0212 19:17:47.267941 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.268160 kubelet[2463]: E0212 19:17:47.268148 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.268234 kubelet[2463]: W0212 19:17:47.268222 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.268289 kubelet[2463]: E0212 19:17:47.268280 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.268508 kubelet[2463]: E0212 19:17:47.268496 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.268589 kubelet[2463]: W0212 19:17:47.268578 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.268647 kubelet[2463]: E0212 19:17:47.268638 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.269055 kubelet[2463]: E0212 19:17:47.269043 2463 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:17:47.269146 kubelet[2463]: W0212 19:17:47.269134 2463 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:17:47.269208 kubelet[2463]: E0212 19:17:47.269196 2463 plugins.go:729] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:17:47.690925 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount483472504.mount: Deactivated successfully. Feb 12 19:17:47.964589 env[1346]: time="2024-02-12T19:17:47.964470916Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:47.973750 env[1346]: time="2024-02-12T19:17:47.973692418Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:47.978139 env[1346]: time="2024-02-12T19:17:47.978101036Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:47.984219 env[1346]: time="2024-02-12T19:17:47.984156840Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:47.984618 env[1346]: time="2024-02-12T19:17:47.984592226Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:17:47.986544 env[1346]: time="2024-02-12T19:17:47.986511764Z" level=info msg="CreateContainer within sandbox \"2e81406b04f6eec2ce599aab78f51654f73c43620c0c17c508b01ff5b110a269\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:17:48.029098 env[1346]: time="2024-02-12T19:17:48.029046687Z" level=info msg="CreateContainer within sandbox \"2e81406b04f6eec2ce599aab78f51654f73c43620c0c17c508b01ff5b110a269\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"6fc9fcfd3f8bc2cc3bcc06c57a92c6d23684e4c814af1c52209ba6cdd4ec96ee\"" Feb 12 19:17:48.029657 env[1346]: time="2024-02-12T19:17:48.029632149Z" level=info msg="StartContainer for \"6fc9fcfd3f8bc2cc3bcc06c57a92c6d23684e4c814af1c52209ba6cdd4ec96ee\"" Feb 12 19:17:48.045473 systemd[1]: Started cri-containerd-6fc9fcfd3f8bc2cc3bcc06c57a92c6d23684e4c814af1c52209ba6cdd4ec96ee.scope. Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=2896 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:48.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633966636664336638626332636333626363303663353761393263 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit: BPF prog-id=140 op=LOAD Feb 12 19:17:48.068000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=2896 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:48.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633966636664336638626332636333626363303663353761393263 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit: BPF prog-id=141 op=LOAD Feb 12 19:17:48.068000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=2896 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:48.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633966636664336638626332636333626363303663353761393263 Feb 12 19:17:48.068000 audit: BPF prog-id=141 op=UNLOAD Feb 12 19:17:48.068000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { perfmon } for pid=3009 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit[3009]: AVC avc: denied { bpf } for pid=3009 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:48.068000 audit: BPF prog-id=142 op=LOAD Feb 12 19:17:48.068000 audit[3009]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=2896 pid=3009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:48.068000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3666633966636664336638626332636333626363303663353761393263 Feb 12 19:17:48.091276 env[1346]: time="2024-02-12T19:17:48.091167438Z" level=info msg="StartContainer for \"6fc9fcfd3f8bc2cc3bcc06c57a92c6d23684e4c814af1c52209ba6cdd4ec96ee\" returns successfully" Feb 12 19:17:48.097971 systemd[1]: cri-containerd-6fc9fcfd3f8bc2cc3bcc06c57a92c6d23684e4c814af1c52209ba6cdd4ec96ee.scope: Deactivated successfully. Feb 12 19:17:48.102000 audit: BPF prog-id=142 op=UNLOAD Feb 12 19:17:48.134767 kubelet[2463]: I0212 19:17:48.133920 2463 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:17:48.995664 env[1346]: time="2024-02-12T19:17:48.995606036Z" level=info msg="shim disconnected" id=6fc9fcfd3f8bc2cc3bcc06c57a92c6d23684e4c814af1c52209ba6cdd4ec96ee Feb 12 19:17:48.995664 env[1346]: time="2024-02-12T19:17:48.995655595Z" level=warning msg="cleaning up after shim disconnected" id=6fc9fcfd3f8bc2cc3bcc06c57a92c6d23684e4c814af1c52209ba6cdd4ec96ee namespace=k8s.io Feb 12 19:17:48.995664 env[1346]: time="2024-02-12T19:17:48.995665914Z" level=info msg="cleaning up dead shim" Feb 12 19:17:49.007797 env[1346]: time="2024-02-12T19:17:49.007740855Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:17:49Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3053 runtime=io.containerd.runc.v2\n" Feb 12 19:17:49.044994 kubelet[2463]: E0212 19:17:49.044970 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8zcl" podUID=09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b Feb 12 19:17:49.140116 env[1346]: time="2024-02-12T19:17:49.140077292Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:17:50.588962 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3679073477.mount: Deactivated successfully. Feb 12 19:17:51.043219 kubelet[2463]: E0212 19:17:51.042865 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8zcl" podUID=09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b Feb 12 19:17:53.047229 kubelet[2463]: E0212 19:17:53.043179 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8zcl" podUID=09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b Feb 12 19:17:53.864189 env[1346]: time="2024-02-12T19:17:53.864137466Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:53.872661 env[1346]: time="2024-02-12T19:17:53.872622379Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:53.883500 env[1346]: time="2024-02-12T19:17:53.883463423Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:53.889349 env[1346]: time="2024-02-12T19:17:53.889303213Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:17:53.889990 env[1346]: time="2024-02-12T19:17:53.889959314Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:17:53.893982 env[1346]: time="2024-02-12T19:17:53.893923359Z" level=info msg="CreateContainer within sandbox \"2e81406b04f6eec2ce599aab78f51654f73c43620c0c17c508b01ff5b110a269\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:17:53.949710 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2875992862.mount: Deactivated successfully. Feb 12 19:17:53.991602 env[1346]: time="2024-02-12T19:17:53.991541077Z" level=info msg="CreateContainer within sandbox \"2e81406b04f6eec2ce599aab78f51654f73c43620c0c17c508b01ff5b110a269\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"50d2a2d03fd1dcd30d09fb06dc3bdb2243a1d988f91689be1a884a25a02be85d\"" Feb 12 19:17:53.994083 env[1346]: time="2024-02-12T19:17:53.993951127Z" level=info msg="StartContainer for \"50d2a2d03fd1dcd30d09fb06dc3bdb2243a1d988f91689be1a884a25a02be85d\"" Feb 12 19:17:54.025437 systemd[1]: Started cri-containerd-50d2a2d03fd1dcd30d09fb06dc3bdb2243a1d988f91689be1a884a25a02be85d.scope. Feb 12 19:17:54.040000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047625 kernel: kauditd_printk_skb: 91 callbacks suppressed Feb 12 19:17:54.047722 kernel: audit: type=1400 audit(1707765474.040:1142): avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.040000 audit[3076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2896 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:54.097924 kernel: audit: type=1300 audit(1707765474.040:1142): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2896 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:54.040000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643261326430336664316463643330643039666230366463336264 Feb 12 19:17:54.125341 kernel: audit: type=1327 audit(1707765474.040:1142): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643261326430336664316463643330643039666230366463336264 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.146545 kernel: audit: type=1400 audit(1707765474.041:1143): avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.167058 kernel: audit: type=1400 audit(1707765474.041:1143): avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.185939 kernel: audit: type=1400 audit(1707765474.041:1143): avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.206459 kernel: audit: type=1400 audit(1707765474.041:1143): avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.226593 env[1346]: time="2024-02-12T19:17:54.226550983Z" level=info msg="StartContainer for \"50d2a2d03fd1dcd30d09fb06dc3bdb2243a1d988f91689be1a884a25a02be85d\" returns successfully" Feb 12 19:17:54.245689 kernel: audit: type=1400 audit(1707765474.041:1143): avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.245827 kernel: audit: type=1400 audit(1707765474.041:1143): avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.264965 kernel: audit: type=1400 audit(1707765474.041:1143): avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.041000 audit: BPF prog-id=143 op=LOAD Feb 12 19:17:54.041000 audit[3076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2896 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:54.041000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643261326430336664316463643330643039666230366463336264 Feb 12 19:17:54.047000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.047000 audit: BPF prog-id=144 op=LOAD Feb 12 19:17:54.047000 audit[3076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2896 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:54.047000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643261326430336664316463643330643039666230366463336264 Feb 12 19:17:54.067000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:17:54.067000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { perfmon } for pid=3076 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit[3076]: AVC avc: denied { bpf } for pid=3076 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:17:54.067000 audit: BPF prog-id=145 op=LOAD Feb 12 19:17:54.067000 audit[3076]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2896 pid=3076 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:17:54.067000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3530643261326430336664316463643330643039666230366463336264 Feb 12 19:17:54.947611 systemd[1]: run-containerd-runc-k8s.io-50d2a2d03fd1dcd30d09fb06dc3bdb2243a1d988f91689be1a884a25a02be85d-runc.6v5gLi.mount: Deactivated successfully. Feb 12 19:17:55.043821 kubelet[2463]: E0212 19:17:55.043788 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-d8zcl" podUID=09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b Feb 12 19:17:55.476772 env[1346]: time="2024-02-12T19:17:55.476633644Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:17:55.478890 systemd[1]: cri-containerd-50d2a2d03fd1dcd30d09fb06dc3bdb2243a1d988f91689be1a884a25a02be85d.scope: Deactivated successfully. Feb 12 19:17:55.483000 audit: BPF prog-id=145 op=UNLOAD Feb 12 19:17:55.495107 kubelet[2463]: I0212 19:17:55.495083 2463 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:17:55.501071 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-50d2a2d03fd1dcd30d09fb06dc3bdb2243a1d988f91689be1a884a25a02be85d-rootfs.mount: Deactivated successfully. Feb 12 19:17:55.521276 kubelet[2463]: I0212 19:17:55.521242 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:55.842145 kubelet[2463]: I0212 19:17:55.530339 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:55.842145 kubelet[2463]: I0212 19:17:55.532465 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:17:55.842145 kubelet[2463]: I0212 19:17:55.635542 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dz4s5\" (UniqueName: \"kubernetes.io/projected/bad1b19d-6a8d-414f-ac13-5085154ffaf6-kube-api-access-dz4s5\") pod \"coredns-5d78c9869d-5fvxj\" (UID: \"bad1b19d-6a8d-414f-ac13-5085154ffaf6\") " pod="kube-system/coredns-5d78c9869d-5fvxj" Feb 12 19:17:55.842145 kubelet[2463]: I0212 19:17:55.635647 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bad1b19d-6a8d-414f-ac13-5085154ffaf6-config-volume\") pod \"coredns-5d78c9869d-5fvxj\" (UID: \"bad1b19d-6a8d-414f-ac13-5085154ffaf6\") " pod="kube-system/coredns-5d78c9869d-5fvxj" Feb 12 19:17:55.842145 kubelet[2463]: I0212 19:17:55.635686 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fd97887b-ce3a-4e72-afd6-e0cefc89c552-tigera-ca-bundle\") pod \"calico-kube-controllers-c875bd866-4pxqw\" (UID: \"fd97887b-ce3a-4e72-afd6-e0cefc89c552\") " pod="calico-system/calico-kube-controllers-c875bd866-4pxqw" Feb 12 19:17:55.842145 kubelet[2463]: I0212 19:17:55.635708 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6p5g9\" (UniqueName: \"kubernetes.io/projected/fd97887b-ce3a-4e72-afd6-e0cefc89c552-kube-api-access-6p5g9\") pod \"calico-kube-controllers-c875bd866-4pxqw\" (UID: \"fd97887b-ce3a-4e72-afd6-e0cefc89c552\") " pod="calico-system/calico-kube-controllers-c875bd866-4pxqw" Feb 12 19:17:55.526043 systemd[1]: Created slice kubepods-burstable-pod2b4537c7_703c_4fb7_865e_ca2b24bf23c8.slice. Feb 12 19:17:55.842456 kubelet[2463]: I0212 19:17:55.635769 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-jdx9l\" (UniqueName: \"kubernetes.io/projected/2b4537c7-703c-4fb7-865e-ca2b24bf23c8-kube-api-access-jdx9l\") pod \"coredns-5d78c9869d-8cd7j\" (UID: \"2b4537c7-703c-4fb7-865e-ca2b24bf23c8\") " pod="kube-system/coredns-5d78c9869d-8cd7j" Feb 12 19:17:55.842456 kubelet[2463]: I0212 19:17:55.635791 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/2b4537c7-703c-4fb7-865e-ca2b24bf23c8-config-volume\") pod \"coredns-5d78c9869d-8cd7j\" (UID: \"2b4537c7-703c-4fb7-865e-ca2b24bf23c8\") " pod="kube-system/coredns-5d78c9869d-8cd7j" Feb 12 19:17:55.536061 systemd[1]: Created slice kubepods-besteffort-podfd97887b_ce3a_4e72_afd6_e0cefc89c552.slice. Feb 12 19:17:55.542020 systemd[1]: Created slice kubepods-burstable-podbad1b19d_6a8d_414f_ac13_5085154ffaf6.slice. Feb 12 19:17:56.145449 env[1346]: time="2024-02-12T19:17:56.145050834Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8cd7j,Uid:2b4537c7-703c-4fb7-865e-ca2b24bf23c8,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:56.145449 env[1346]: time="2024-02-12T19:17:56.145345706Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c875bd866-4pxqw,Uid:fd97887b-ce3a-4e72-afd6-e0cefc89c552,Namespace:calico-system,Attempt:0,}" Feb 12 19:17:56.151239 env[1346]: time="2024-02-12T19:17:56.151064587Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5fvxj,Uid:bad1b19d-6a8d-414f-ac13-5085154ffaf6,Namespace:kube-system,Attempt:0,}" Feb 12 19:17:56.665495 env[1346]: time="2024-02-12T19:17:56.665446881Z" level=info msg="shim disconnected" id=50d2a2d03fd1dcd30d09fb06dc3bdb2243a1d988f91689be1a884a25a02be85d Feb 12 19:17:56.665495 env[1346]: time="2024-02-12T19:17:56.665490600Z" level=warning msg="cleaning up after shim disconnected" id=50d2a2d03fd1dcd30d09fb06dc3bdb2243a1d988f91689be1a884a25a02be85d namespace=k8s.io Feb 12 19:17:56.665495 env[1346]: time="2024-02-12T19:17:56.665499160Z" level=info msg="cleaning up dead shim" Feb 12 19:17:56.677124 env[1346]: time="2024-02-12T19:17:56.677059039Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:17:56Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3133 runtime=io.containerd.runc.v2\n" Feb 12 19:17:56.794239 env[1346]: time="2024-02-12T19:17:56.794171671Z" level=error msg="Failed to destroy network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.795051 env[1346]: time="2024-02-12T19:17:56.795011728Z" level=error msg="encountered an error cleaning up failed sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.795188 env[1346]: time="2024-02-12T19:17:56.795162004Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5fvxj,Uid:bad1b19d-6a8d-414f-ac13-5085154ffaf6,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.796905 kubelet[2463]: E0212 19:17:56.795607 2463 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.796905 kubelet[2463]: E0212 19:17:56.795665 2463 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5fvxj" Feb 12 19:17:56.796905 kubelet[2463]: E0212 19:17:56.795684 2463 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-5fvxj" Feb 12 19:17:56.797226 kubelet[2463]: E0212 19:17:56.795747 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-5fvxj_kube-system(bad1b19d-6a8d-414f-ac13-5085154ffaf6)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-5fvxj_kube-system(bad1b19d-6a8d-414f-ac13-5085154ffaf6)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5fvxj" podUID=bad1b19d-6a8d-414f-ac13-5085154ffaf6 Feb 12 19:17:56.843903 env[1346]: time="2024-02-12T19:17:56.843832694Z" level=error msg="Failed to destroy network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.844226 env[1346]: time="2024-02-12T19:17:56.844189244Z" level=error msg="encountered an error cleaning up failed sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.844279 env[1346]: time="2024-02-12T19:17:56.844246563Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8cd7j,Uid:2b4537c7-703c-4fb7-865e-ca2b24bf23c8,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.844509 kubelet[2463]: E0212 19:17:56.844483 2463 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.844570 kubelet[2463]: E0212 19:17:56.844546 2463 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8cd7j" Feb 12 19:17:56.844603 kubelet[2463]: E0212 19:17:56.844575 2463 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5d78c9869d-8cd7j" Feb 12 19:17:56.844783 kubelet[2463]: E0212 19:17:56.844642 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5d78c9869d-8cd7j_kube-system(2b4537c7-703c-4fb7-865e-ca2b24bf23c8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5d78c9869d-8cd7j_kube-system(2b4537c7-703c-4fb7-865e-ca2b24bf23c8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8cd7j" podUID=2b4537c7-703c-4fb7-865e-ca2b24bf23c8 Feb 12 19:17:56.850752 env[1346]: time="2024-02-12T19:17:56.850678064Z" level=error msg="Failed to destroy network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.851242 env[1346]: time="2024-02-12T19:17:56.851210049Z" level=error msg="encountered an error cleaning up failed sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.851381 env[1346]: time="2024-02-12T19:17:56.851355245Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c875bd866-4pxqw,Uid:fd97887b-ce3a-4e72-afd6-e0cefc89c552,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.851714 kubelet[2463]: E0212 19:17:56.851682 2463 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:56.851817 kubelet[2463]: E0212 19:17:56.851761 2463 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c875bd866-4pxqw" Feb 12 19:17:56.851817 kubelet[2463]: E0212 19:17:56.851787 2463 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-c875bd866-4pxqw" Feb 12 19:17:56.851879 kubelet[2463]: E0212 19:17:56.851837 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-c875bd866-4pxqw_calico-system(fd97887b-ce3a-4e72-afd6-e0cefc89c552)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-c875bd866-4pxqw_calico-system(fd97887b-ce3a-4e72-afd6-e0cefc89c552)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c875bd866-4pxqw" podUID=fd97887b-ce3a-4e72-afd6-e0cefc89c552 Feb 12 19:17:57.047716 systemd[1]: Created slice kubepods-besteffort-pod09c9c1ad_87e3_401b_bf4d_ed8fcb85c00b.slice. Feb 12 19:17:57.050368 env[1346]: time="2024-02-12T19:17:57.050333908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-d8zcl,Uid:09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b,Namespace:calico-system,Attempt:0,}" Feb 12 19:17:57.144600 env[1346]: time="2024-02-12T19:17:57.144547656Z" level=error msg="Failed to destroy network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.145048 env[1346]: time="2024-02-12T19:17:57.145018883Z" level=error msg="encountered an error cleaning up failed sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.145171 env[1346]: time="2024-02-12T19:17:57.145146880Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-d8zcl,Uid:09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.145754 kubelet[2463]: E0212 19:17:57.145422 2463 remote_runtime.go:176] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.145754 kubelet[2463]: E0212 19:17:57.145468 2463 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-d8zcl" Feb 12 19:17:57.145754 kubelet[2463]: E0212 19:17:57.145489 2463 kuberuntime_manager.go:1122] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-d8zcl" Feb 12 19:17:57.145930 kubelet[2463]: E0212 19:17:57.145529 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-d8zcl_calico-system(09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-d8zcl_calico-system(09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-d8zcl" podUID=09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b Feb 12 19:17:57.160386 kubelet[2463]: I0212 19:17:57.159853 2463 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:17:57.161969 env[1346]: time="2024-02-12T19:17:57.160790892Z" level=info msg="StopPodSandbox for \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\"" Feb 12 19:17:57.165111 env[1346]: time="2024-02-12T19:17:57.165085335Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:17:57.166510 kubelet[2463]: I0212 19:17:57.166243 2463 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:17:57.166750 env[1346]: time="2024-02-12T19:17:57.166705091Z" level=info msg="StopPodSandbox for \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\"" Feb 12 19:17:57.180313 kubelet[2463]: I0212 19:17:57.180267 2463 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:17:57.181081 env[1346]: time="2024-02-12T19:17:57.181053219Z" level=info msg="StopPodSandbox for \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\"" Feb 12 19:17:57.181695 kubelet[2463]: I0212 19:17:57.181673 2463 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:17:57.182110 env[1346]: time="2024-02-12T19:17:57.182079191Z" level=info msg="StopPodSandbox for \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\"" Feb 12 19:17:57.225484 env[1346]: time="2024-02-12T19:17:57.225425528Z" level=error msg="StopPodSandbox for \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\" failed" error="failed to destroy network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.227246 kubelet[2463]: E0212 19:17:57.227067 2463 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:17:57.227246 kubelet[2463]: E0212 19:17:57.227137 2463 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea} Feb 12 19:17:57.227246 kubelet[2463]: E0212 19:17:57.227180 2463 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bad1b19d-6a8d-414f-ac13-5085154ffaf6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:17:57.227246 kubelet[2463]: E0212 19:17:57.227217 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bad1b19d-6a8d-414f-ac13-5085154ffaf6\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-5fvxj" podUID=bad1b19d-6a8d-414f-ac13-5085154ffaf6 Feb 12 19:17:57.244150 env[1346]: time="2024-02-12T19:17:57.244096258Z" level=error msg="StopPodSandbox for \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\" failed" error="failed to destroy network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.244681 kubelet[2463]: E0212 19:17:57.244542 2463 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:17:57.244681 kubelet[2463]: E0212 19:17:57.244590 2463 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99} Feb 12 19:17:57.244681 kubelet[2463]: E0212 19:17:57.244623 2463 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:17:57.244681 kubelet[2463]: E0212 19:17:57.244662 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-d8zcl" podUID=09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b Feb 12 19:17:57.249387 env[1346]: time="2024-02-12T19:17:57.249332035Z" level=error msg="StopPodSandbox for \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\" failed" error="failed to destroy network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.249673 kubelet[2463]: E0212 19:17:57.249649 2463 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:17:57.249760 kubelet[2463]: E0212 19:17:57.249685 2463 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c} Feb 12 19:17:57.249760 kubelet[2463]: E0212 19:17:57.249714 2463 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"2b4537c7-703c-4fb7-865e-ca2b24bf23c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:17:57.249760 kubelet[2463]: E0212 19:17:57.249750 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"2b4537c7-703c-4fb7-865e-ca2b24bf23c8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5d78c9869d-8cd7j" podUID=2b4537c7-703c-4fb7-865e-ca2b24bf23c8 Feb 12 19:17:57.256770 env[1346]: time="2024-02-12T19:17:57.256702994Z" level=error msg="StopPodSandbox for \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\" failed" error="failed to destroy network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:17:57.257083 kubelet[2463]: E0212 19:17:57.257062 2463 remote_runtime.go:205] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:17:57.257152 kubelet[2463]: E0212 19:17:57.257097 2463 kuberuntime_manager.go:1312] "Failed to stop sandbox" podSandboxID={Type:containerd ID:7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a} Feb 12 19:17:57.257152 kubelet[2463]: E0212 19:17:57.257128 2463 kuberuntime_manager.go:1038] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fd97887b-ce3a-4e72-afd6-e0cefc89c552\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:17:57.257228 kubelet[2463]: E0212 19:17:57.257151 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fd97887b-ce3a-4e72-afd6-e0cefc89c552\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-c875bd866-4pxqw" podUID=fd97887b-ce3a-4e72-afd6-e0cefc89c552 Feb 12 19:17:57.713367 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a-shm.mount: Deactivated successfully. Feb 12 19:17:57.713459 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c-shm.mount: Deactivated successfully. Feb 12 19:17:57.713510 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea-shm.mount: Deactivated successfully. Feb 12 19:18:03.476973 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount657607734.mount: Deactivated successfully. Feb 12 19:18:03.669137 env[1346]: time="2024-02-12T19:18:03.669093046Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:03.684652 env[1346]: time="2024-02-12T19:18:03.684611258Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:03.706430 env[1346]: time="2024-02-12T19:18:03.706381394Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:03.732257 env[1346]: time="2024-02-12T19:18:03.732133551Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:03.732926 env[1346]: time="2024-02-12T19:18:03.732898892Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:18:03.748387 env[1346]: time="2024-02-12T19:18:03.748342426Z" level=info msg="CreateContainer within sandbox \"2e81406b04f6eec2ce599aab78f51654f73c43620c0c17c508b01ff5b110a269\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:18:03.787772 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2727785847.mount: Deactivated successfully. Feb 12 19:18:03.806105 env[1346]: time="2024-02-12T19:18:03.806039064Z" level=info msg="CreateContainer within sandbox \"2e81406b04f6eec2ce599aab78f51654f73c43620c0c17c508b01ff5b110a269\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c\"" Feb 12 19:18:03.808276 env[1346]: time="2024-02-12T19:18:03.808236169Z" level=info msg="StartContainer for \"baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c\"" Feb 12 19:18:03.827795 systemd[1]: Started cri-containerd-baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c.scope. Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.854397 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:18:03.854506 kernel: audit: type=1400 audit(1707765483.847:1149): avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit[3355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2896 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.909013 kernel: audit: type=1300 audit(1707765483.847:1149): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2896 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613432353161353935613730666432643064646336376436396533 Feb 12 19:18:03.942525 kernel: audit: type=1327 audit(1707765483.847:1149): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613432353161353935613730666432643064646336376436396533 Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.965114 kernel: audit: type=1400 audit(1707765483.847:1150): avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.987760 kernel: audit: type=1400 audit(1707765483.847:1150): avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.009577 kernel: audit: type=1400 audit(1707765483.847:1150): avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.032877 kernel: audit: type=1400 audit(1707765483.847:1150): avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.033201 env[1346]: time="2024-02-12T19:18:04.033162718Z" level=info msg="StartContainer for \"baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c\" returns successfully" Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.079182 kernel: audit: type=1400 audit(1707765483.847:1150): avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.079301 kernel: audit: type=1400 audit(1707765483.847:1150): avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:04.079328 kernel: audit: type=1400 audit(1707765483.847:1150): avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.847000 audit: BPF prog-id=146 op=LOAD Feb 12 19:18:03.847000 audit[3355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2896 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613432353161353935613730666432643064646336376436396533 Feb 12 19:18:03.852000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.852000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.852000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.852000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.852000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.852000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.852000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.852000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.852000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.852000 audit: BPF prog-id=147 op=LOAD Feb 12 19:18:03.852000 audit[3355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2896 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.852000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613432353161353935613730666432643064646336376436396533 Feb 12 19:18:03.872000 audit: BPF prog-id=147 op=UNLOAD Feb 12 19:18:03.872000 audit: BPF prog-id=146 op=UNLOAD Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { perfmon } for pid=3355 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit[3355]: AVC avc: denied { bpf } for pid=3355 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:03.872000 audit: BPF prog-id=148 op=LOAD Feb 12 19:18:03.872000 audit[3355]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2896 pid=3355 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:03.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6261613432353161353935613730666432643064646336376436396533 Feb 12 19:18:04.270882 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:18:04.271021 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:18:04.883844 kubelet[2463]: I0212 19:18:04.883163 2463 prober_manager.go:287] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:18:04.893789 kubelet[2463]: I0212 19:18:04.893762 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-xfvzx" podStartSLOduration=2.072699641 podCreationTimestamp="2024-02-12 19:17:43 +0000 UTC" firstStartedPulling="2024-02-12 19:17:43.912230617 +0000 UTC m=+21.015419624" lastFinishedPulling="2024-02-12 19:18:03.733233403 +0000 UTC m=+40.836422370" observedRunningTime="2024-02-12 19:18:04.212383221 +0000 UTC m=+41.315572228" watchObservedRunningTime="2024-02-12 19:18:04.893702387 +0000 UTC m=+41.996891394" Feb 12 19:18:04.917000 audit[3433]: NETFILTER_CFG table=filter:98 family=2 entries=15 op=nft_register_rule pid=3433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:04.917000 audit[3433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffdf8f4840 a2=0 a3=ffffb29826c0 items=0 ppid=2641 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:04.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:04.917000 audit[3433]: NETFILTER_CFG table=nat:99 family=2 entries=19 op=nft_register_chain pid=3433 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:04.917000 audit[3433]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6068 a0=3 a1=ffffdf8f4840 a2=0 a3=ffffb29826c0 items=0 ppid=2641 pid=3433 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:04.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:05.213277 systemd[1]: run-containerd-runc-k8s.io-baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c-runc.e5drVl.mount: Deactivated successfully. Feb 12 19:18:05.680000 audit[3506]: AVC avc: denied { write } for pid=3506 comm="tee" name="fd" dev="proc" ino=23517 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.680000 audit[3506]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb408965 a2=241 a3=1b6 items=1 ppid=3467 pid=3506 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.680000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:18:05.680000 audit: PATH item=0 name="/dev/fd/63" inode=23508 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.680000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.701000 audit[3524]: AVC avc: denied { write } for pid=3524 comm="tee" name="fd" dev="proc" ino=23537 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.701000 audit[3524]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc55dd977 a2=241 a3=1b6 items=1 ppid=3478 pid=3524 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.701000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:18:05.701000 audit: PATH item=0 name="/dev/fd/63" inode=23526 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.701000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.720000 audit[3520]: AVC avc: denied { write } for pid=3520 comm="tee" name="fd" dev="proc" ino=23543 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.720000 audit[3520]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffc6ba5975 a2=241 a3=1b6 items=1 ppid=3472 pid=3520 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.720000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:18:05.720000 audit: PATH item=0 name="/dev/fd/63" inode=24505 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.720000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.721000 audit[3526]: AVC avc: denied { write } for pid=3526 comm="tee" name="fd" dev="proc" ino=23547 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.721000 audit[3526]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb478975 a2=241 a3=1b6 items=1 ppid=3474 pid=3526 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.721000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:18:05.721000 audit: PATH item=0 name="/dev/fd/63" inode=23534 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.721000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.726000 audit[3523]: AVC avc: denied { write } for pid=3523 comm="tee" name="fd" dev="proc" ino=24512 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.726000 audit[3523]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffffa341975 a2=241 a3=1b6 items=1 ppid=3470 pid=3523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.726000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:18:05.726000 audit: PATH item=0 name="/dev/fd/63" inode=24506 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.726000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.734000 audit[3529]: AVC avc: denied { write } for pid=3529 comm="tee" name="fd" dev="proc" ino=24516 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.734000 audit[3529]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe3104976 a2=241 a3=1b6 items=1 ppid=3475 pid=3529 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.734000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:18:05.734000 audit: PATH item=0 name="/dev/fd/63" inode=24507 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.736000 audit[3534]: AVC avc: denied { write } for pid=3534 comm="tee" name="fd" dev="proc" ino=24520 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:18:05.736000 audit[3534]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffeade9966 a2=241 a3=1b6 items=1 ppid=3482 pid=3534 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:05.736000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:18:05.734000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:05.736000 audit: PATH item=0 name="/dev/fd/63" inode=24508 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:18:05.736000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:18:06.077000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.077000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.077000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.077000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.077000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.077000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.077000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.077000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.077000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.077000 audit: BPF prog-id=149 op=LOAD Feb 12 19:18:06.077000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe06a8858 a2=70 a3=0 items=0 ppid=3473 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.077000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:18:06.078000 audit: BPF prog-id=149 op=UNLOAD Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit: BPF prog-id=150 op=LOAD Feb 12 19:18:06.078000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=ffffe06a8858 a2=70 a3=4a174c items=0 ppid=3473 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:18:06.078000 audit: BPF prog-id=150 op=UNLOAD Feb 12 19:18:06.078000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.078000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=ffffe06a8888 a2=70 a3=c93379f items=0 ppid=3473 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.078000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { perfmon } for pid=3608 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit[3608]: AVC avc: denied { bpf } for pid=3608 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.079000 audit: BPF prog-id=151 op=LOAD Feb 12 19:18:06.079000 audit[3608]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=ffffe06a87d8 a2=70 a3=c9337b9 items=0 ppid=3473 pid=3608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.079000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:18:06.084000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.084000 audit[3610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2910138 a2=70 a3=0 items=0 ppid=3473 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.084000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:18:06.084000 audit[3610]: AVC avc: denied { bpf } for pid=3610 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:06.084000 audit[3610]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe2910018 a2=70 a3=2 items=0 ppid=3473 pid=3610 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.084000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:18:06.090000 audit: BPF prog-id=151 op=UNLOAD Feb 12 19:18:06.226000 audit[3637]: NETFILTER_CFG table=mangle:100 family=2 entries=19 op=nft_register_chain pid=3637 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:06.226000 audit[3637]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=fffff9295db0 a2=0 a3=ffffa86ebfa8 items=0 ppid=3473 pid=3637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.226000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:06.241000 audit[3636]: NETFILTER_CFG table=raw:101 family=2 entries=19 op=nft_register_chain pid=3636 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:06.241000 audit[3636]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffc5b80a60 a2=0 a3=ffffacd3cfa8 items=0 ppid=3473 pid=3636 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.241000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:06.261000 audit[3642]: NETFILTER_CFG table=filter:102 family=2 entries=39 op=nft_register_chain pid=3642 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:06.261000 audit[3642]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18472 a0=3 a1=ffffd5a12a10 a2=0 a3=ffff95edcfa8 items=0 ppid=3473 pid=3642 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.261000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:06.261000 audit[3638]: NETFILTER_CFG table=nat:103 family=2 entries=16 op=nft_register_chain pid=3638 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:06.261000 audit[3638]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffc800bf50 a2=0 a3=ffff9e3bbfa8 items=0 ppid=3473 pid=3638 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:06.261000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:06.961373 systemd-networkd[1500]: vxlan.calico: Link UP Feb 12 19:18:06.961380 systemd-networkd[1500]: vxlan.calico: Gained carrier Feb 12 19:18:08.044760 env[1346]: time="2024-02-12T19:18:08.043674479Z" level=info msg="StopPodSandbox for \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\"" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.406 [INFO][3667] k8s.go 578: Cleaning up netns ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.406 [INFO][3667] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" iface="eth0" netns="/var/run/netns/cni-ba18c123-a431-1203-e450-040370765345" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.407 [INFO][3667] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" iface="eth0" netns="/var/run/netns/cni-ba18c123-a431-1203-e450-040370765345" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.407 [INFO][3667] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" iface="eth0" netns="/var/run/netns/cni-ba18c123-a431-1203-e450-040370765345" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.407 [INFO][3667] k8s.go 585: Releasing IP address(es) ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.407 [INFO][3667] utils.go 188: Calico CNI releasing IP address ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.424 [INFO][3673] ipam_plugin.go 415: Releasing address using handleID ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" HandleID="k8s-pod-network.7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.424 [INFO][3673] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.424 [INFO][3673] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.433 [WARNING][3673] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" HandleID="k8s-pod-network.7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.433 [INFO][3673] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" HandleID="k8s-pod-network.7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.434 [INFO][3673] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:08.436906 env[1346]: 2024-02-12 19:18:08.435 [INFO][3667] k8s.go 591: Teardown processing complete. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:08.439550 env[1346]: time="2024-02-12T19:18:08.439506146Z" level=info msg="TearDown network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\" successfully" Feb 12 19:18:08.439659 env[1346]: time="2024-02-12T19:18:08.439643063Z" level=info msg="StopPodSandbox for \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\" returns successfully" Feb 12 19:18:08.441102 systemd[1]: run-netns-cni\x2dba18c123\x2da431\x2d1203\x2de450\x2d040370765345.mount: Deactivated successfully. Feb 12 19:18:08.441884 env[1346]: time="2024-02-12T19:18:08.441859051Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c875bd866-4pxqw,Uid:fd97887b-ce3a-4e72-afd6-e0cefc89c552,Namespace:calico-system,Attempt:1,}" Feb 12 19:18:08.689028 systemd-networkd[1500]: vxlan.calico: Gained IPv6LL Feb 12 19:18:08.918283 systemd-networkd[1500]: cali22608793518: Link UP Feb 12 19:18:08.933377 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:18:08.933665 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali22608793518: link becomes ready Feb 12 19:18:08.934057 systemd-networkd[1500]: cali22608793518: Gained carrier Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.850 [INFO][3681] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0 calico-kube-controllers-c875bd866- calico-system fd97887b-ce3a-4e72-afd6-e0cefc89c552 713 0 2024-02-12 19:17:43 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:c875bd866 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-d216911d7c calico-kube-controllers-c875bd866-4pxqw eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali22608793518 [] []}} ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Namespace="calico-system" Pod="calico-kube-controllers-c875bd866-4pxqw" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.850 [INFO][3681] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Namespace="calico-system" Pod="calico-kube-controllers-c875bd866-4pxqw" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.878 [INFO][3692] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" HandleID="k8s-pod-network.2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.889 [INFO][3692] ipam_plugin.go 268: Auto assigning IP ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" HandleID="k8s-pod-network.2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027ab00), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-d216911d7c", "pod":"calico-kube-controllers-c875bd866-4pxqw", "timestamp":"2024-02-12 19:18:08.878486444 +0000 UTC"}, Hostname:"ci-3510.3.2-a-d216911d7c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.889 [INFO][3692] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.889 [INFO][3692] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.889 [INFO][3692] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-d216911d7c' Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.891 [INFO][3692] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.894 [INFO][3692] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.897 [INFO][3692] ipam.go 489: Trying affinity for 192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.898 [INFO][3692] ipam.go 155: Attempting to load block cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.900 [INFO][3692] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.900 [INFO][3692] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.128/26 handle="k8s-pod-network.2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.901 [INFO][3692] ipam.go 1682: Creating new handle: k8s-pod-network.2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.905 [INFO][3692] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.128/26 handle="k8s-pod-network.2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.911 [INFO][3692] ipam.go 1216: Successfully claimed IPs: [192.168.7.129/26] block=192.168.7.128/26 handle="k8s-pod-network.2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.911 [INFO][3692] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.129/26] handle="k8s-pod-network.2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.911 [INFO][3692] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:08.946468 env[1346]: 2024-02-12 19:18:08.911 [INFO][3692] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.129/26] IPv6=[] ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" HandleID="k8s-pod-network.2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.947797 env[1346]: 2024-02-12 19:18:08.913 [INFO][3681] k8s.go 385: Populated endpoint ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Namespace="calico-system" Pod="calico-kube-controllers-c875bd866-4pxqw" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0", GenerateName:"calico-kube-controllers-c875bd866-", Namespace:"calico-system", SelfLink:"", UID:"fd97887b-ce3a-4e72-afd6-e0cefc89c552", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c875bd866", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"", Pod:"calico-kube-controllers-c875bd866-4pxqw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.7.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali22608793518", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:08.947797 env[1346]: 2024-02-12 19:18:08.913 [INFO][3681] k8s.go 386: Calico CNI using IPs: [192.168.7.129/32] ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Namespace="calico-system" Pod="calico-kube-controllers-c875bd866-4pxqw" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.947797 env[1346]: 2024-02-12 19:18:08.914 [INFO][3681] dataplane_linux.go 68: Setting the host side veth name to cali22608793518 ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Namespace="calico-system" Pod="calico-kube-controllers-c875bd866-4pxqw" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.947797 env[1346]: 2024-02-12 19:18:08.935 [INFO][3681] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Namespace="calico-system" Pod="calico-kube-controllers-c875bd866-4pxqw" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.947797 env[1346]: 2024-02-12 19:18:08.936 [INFO][3681] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Namespace="calico-system" Pod="calico-kube-controllers-c875bd866-4pxqw" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0", GenerateName:"calico-kube-controllers-c875bd866-", Namespace:"calico-system", SelfLink:"", UID:"fd97887b-ce3a-4e72-afd6-e0cefc89c552", ResourceVersion:"713", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c875bd866", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce", Pod:"calico-kube-controllers-c875bd866-4pxqw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.7.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali22608793518", MAC:"16:6f:23:e1:54:c2", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:08.947797 env[1346]: 2024-02-12 19:18:08.944 [INFO][3681] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce" Namespace="calico-system" Pod="calico-kube-controllers-c875bd866-4pxqw" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:08.969877 env[1346]: time="2024-02-12T19:18:08.969796910Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:08.970012 env[1346]: time="2024-02-12T19:18:08.969883348Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:08.970012 env[1346]: time="2024-02-12T19:18:08.969909667Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:08.970091 env[1346]: time="2024-02-12T19:18:08.970053024Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce pid=3717 runtime=io.containerd.runc.v2 Feb 12 19:18:08.968000 audit[3718]: NETFILTER_CFG table=filter:104 family=2 entries=36 op=nft_register_chain pid=3718 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:08.977518 kernel: kauditd_printk_skb: 135 callbacks suppressed Feb 12 19:18:08.977650 kernel: audit: type=1325 audit(1707765488.968:1177): table=filter:104 family=2 entries=36 op=nft_register_chain pid=3718 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:08.968000 audit[3718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffdd7ed110 a2=0 a3=ffffbe657fa8 items=0 ppid=3473 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.027981 kernel: audit: type=1300 audit(1707765488.968:1177): arch=c00000b7 syscall=211 success=yes exit=19908 a0=3 a1=ffffdd7ed110 a2=0 a3=ffffbe657fa8 items=0 ppid=3473 pid=3718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:08.968000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:09.053542 kernel: audit: type=1327 audit(1707765488.968:1177): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:09.055175 systemd[1]: Started cri-containerd-2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce.scope. Feb 12 19:18:09.059096 env[1346]: time="2024-02-12T19:18:09.058989601Z" level=info msg="StopPodSandbox for \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\"" Feb 12 19:18:09.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.111014 kernel: audit: type=1400 audit(1707765489.069:1178): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.111181 kernel: audit: type=1400 audit(1707765489.069:1179): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.132580 kernel: audit: type=1400 audit(1707765489.069:1180): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.152526 kernel: audit: type=1400 audit(1707765489.069:1181): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.173584 kernel: audit: type=1400 audit(1707765489.069:1182): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.194080 kernel: audit: type=1400 audit(1707765489.069:1183): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.216840 kernel: audit: type=1400 audit(1707765489.069:1184): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.069000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.069000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.091000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.091000 audit: BPF prog-id=152 op=LOAD Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3717 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264306366653035666361396133326237396231646665376463336236 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3717 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264306366653035666361396133326237396231646665376463336236 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.109000 audit: BPF prog-id=153 op=LOAD Feb 12 19:18:09.109000 audit[3728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3717 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264306366653035666361396133326237396231646665376463336236 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit: BPF prog-id=154 op=LOAD Feb 12 19:18:09.110000 audit[3728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3717 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264306366653035666361396133326237396231646665376463336236 Feb 12 19:18:09.110000 audit: BPF prog-id=154 op=UNLOAD Feb 12 19:18:09.110000 audit: BPF prog-id=153 op=UNLOAD Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { perfmon } for pid=3728 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit[3728]: AVC avc: denied { bpf } for pid=3728 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.110000 audit: BPF prog-id=155 op=LOAD Feb 12 19:18:09.110000 audit[3728]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3717 pid=3728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3264306366653035666361396133326237396231646665376463336236 Feb 12 19:18:09.237054 env[1346]: time="2024-02-12T19:18:09.237004972Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-c875bd866-4pxqw,Uid:fd97887b-ce3a-4e72-afd6-e0cefc89c552,Namespace:calico-system,Attempt:1,} returns sandbox id \"2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce\"" Feb 12 19:18:09.239080 env[1346]: time="2024-02-12T19:18:09.239054885Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.222 [INFO][3760] k8s.go 578: Cleaning up netns ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.222 [INFO][3760] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" iface="eth0" netns="/var/run/netns/cni-1f4d5e1b-6c4f-9b54-bec8-98c45e0c7d0f" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.222 [INFO][3760] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" iface="eth0" netns="/var/run/netns/cni-1f4d5e1b-6c4f-9b54-bec8-98c45e0c7d0f" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.222 [INFO][3760] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" iface="eth0" netns="/var/run/netns/cni-1f4d5e1b-6c4f-9b54-bec8-98c45e0c7d0f" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.222 [INFO][3760] k8s.go 585: Releasing IP address(es) ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.222 [INFO][3760] utils.go 188: Calico CNI releasing IP address ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.250 [INFO][3766] ipam_plugin.go 415: Releasing address using handleID ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" HandleID="k8s-pod-network.e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.250 [INFO][3766] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.250 [INFO][3766] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.259 [WARNING][3766] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" HandleID="k8s-pod-network.e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.259 [INFO][3766] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" HandleID="k8s-pod-network.e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.260 [INFO][3766] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:09.263370 env[1346]: 2024-02-12 19:18:09.262 [INFO][3760] k8s.go 591: Teardown processing complete. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:09.263935 env[1346]: time="2024-02-12T19:18:09.263539280Z" level=info msg="TearDown network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\" successfully" Feb 12 19:18:09.263935 env[1346]: time="2024-02-12T19:18:09.263570279Z" level=info msg="StopPodSandbox for \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\" returns successfully" Feb 12 19:18:09.264473 env[1346]: time="2024-02-12T19:18:09.264448139Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-d8zcl,Uid:09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b,Namespace:calico-system,Attempt:1,}" Feb 12 19:18:09.404230 systemd-networkd[1500]: cali59f0807b11b: Link UP Feb 12 19:18:09.414911 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali59f0807b11b: link becomes ready Feb 12 19:18:09.415831 systemd-networkd[1500]: cali59f0807b11b: Gained carrier Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.332 [INFO][3779] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0 csi-node-driver- calico-system 09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b 718 0 2024-02-12 19:17:43 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:86b88cf7c9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-d216911d7c csi-node-driver-d8zcl eth0 default [] [] [kns.calico-system ksa.calico-system.default] cali59f0807b11b [] []}} ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Namespace="calico-system" Pod="csi-node-driver-d8zcl" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.332 [INFO][3779] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Namespace="calico-system" Pod="csi-node-driver-d8zcl" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.358 [INFO][3791] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" HandleID="k8s-pod-network.5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.372 [INFO][3791] ipam_plugin.go 268: Auto assigning IP ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" HandleID="k8s-pod-network.5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b47c0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-d216911d7c", "pod":"csi-node-driver-d8zcl", "timestamp":"2024-02-12 19:18:09.35881956 +0000 UTC"}, Hostname:"ci-3510.3.2-a-d216911d7c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.372 [INFO][3791] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.372 [INFO][3791] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.372 [INFO][3791] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-d216911d7c' Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.374 [INFO][3791] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.377 [INFO][3791] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.381 [INFO][3791] ipam.go 489: Trying affinity for 192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.382 [INFO][3791] ipam.go 155: Attempting to load block cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.384 [INFO][3791] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.384 [INFO][3791] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.128/26 handle="k8s-pod-network.5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.386 [INFO][3791] ipam.go 1682: Creating new handle: k8s-pod-network.5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.390 [INFO][3791] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.128/26 handle="k8s-pod-network.5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.398 [INFO][3791] ipam.go 1216: Successfully claimed IPs: [192.168.7.130/26] block=192.168.7.128/26 handle="k8s-pod-network.5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.398 [INFO][3791] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.130/26] handle="k8s-pod-network.5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.398 [INFO][3791] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:09.428013 env[1346]: 2024-02-12 19:18:09.398 [INFO][3791] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.130/26] IPv6=[] ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" HandleID="k8s-pod-network.5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.428690 env[1346]: 2024-02-12 19:18:09.399 [INFO][3779] k8s.go 385: Populated endpoint ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Namespace="calico-system" Pod="csi-node-driver-d8zcl" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b", ResourceVersion:"718", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"", Pod:"csi-node-driver-d8zcl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.7.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali59f0807b11b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:09.428690 env[1346]: 2024-02-12 19:18:09.400 [INFO][3779] k8s.go 386: Calico CNI using IPs: [192.168.7.130/32] ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Namespace="calico-system" Pod="csi-node-driver-d8zcl" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.428690 env[1346]: 2024-02-12 19:18:09.400 [INFO][3779] dataplane_linux.go 68: Setting the host side veth name to cali59f0807b11b ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Namespace="calico-system" Pod="csi-node-driver-d8zcl" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.428690 env[1346]: 2024-02-12 19:18:09.417 [INFO][3779] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Namespace="calico-system" Pod="csi-node-driver-d8zcl" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.428690 env[1346]: 2024-02-12 19:18:09.417 [INFO][3779] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Namespace="calico-system" Pod="csi-node-driver-d8zcl" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b", ResourceVersion:"718", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b", Pod:"csi-node-driver-d8zcl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.7.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali59f0807b11b", MAC:"a6:ff:5b:c7:c9:5e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:09.428690 env[1346]: 2024-02-12 19:18:09.426 [INFO][3779] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b" Namespace="calico-system" Pod="csi-node-driver-d8zcl" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:09.440481 systemd[1]: run-netns-cni\x2d1f4d5e1b\x2d6c4f\x2d9b54\x2dbec8\x2d98c45e0c7d0f.mount: Deactivated successfully. Feb 12 19:18:09.449000 audit[3813]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=3813 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:09.449000 audit[3813]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18320 a0=3 a1=ffffdfb14c50 a2=0 a3=ffff93e67fa8 items=0 ppid=3473 pid=3813 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.449000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:09.470628 env[1346]: time="2024-02-12T19:18:09.470469863Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:09.471084 env[1346]: time="2024-02-12T19:18:09.470534182Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:09.471084 env[1346]: time="2024-02-12T19:18:09.470544662Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:09.472771 env[1346]: time="2024-02-12T19:18:09.472609294Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b pid=3820 runtime=io.containerd.runc.v2 Feb 12 19:18:09.486593 systemd[1]: Started cri-containerd-5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b.scope. Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.508000 audit: BPF prog-id=156 op=LOAD Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3820 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531313464333936323863376466623435353139396336343038343334 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3820 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531313464333936323863376466623435353139396336343038343334 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.510000 audit: BPF prog-id=157 op=LOAD Feb 12 19:18:09.510000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3820 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.510000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531313464333936323863376466623435353139396336343038343334 Feb 12 19:18:09.511000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.511000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.511000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.511000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.511000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.511000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.511000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.511000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.511000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.511000 audit: BPF prog-id=158 op=LOAD Feb 12 19:18:09.511000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3820 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.511000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531313464333936323863376466623435353139396336343038343334 Feb 12 19:18:09.511000 audit: BPF prog-id=158 op=UNLOAD Feb 12 19:18:09.511000 audit: BPF prog-id=157 op=UNLOAD Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { perfmon } for pid=3831 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit[3831]: AVC avc: denied { bpf } for pid=3831 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:09.512000 audit: BPF prog-id=159 op=LOAD Feb 12 19:18:09.512000 audit[3831]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3820 pid=3831 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:09.512000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3531313464333936323863376466623435353139396336343038343334 Feb 12 19:18:09.524271 env[1346]: time="2024-02-12T19:18:09.524216863Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-d8zcl,Uid:09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b,Namespace:calico-system,Attempt:1,} returns sandbox id \"5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b\"" Feb 12 19:18:10.043441 env[1346]: time="2024-02-12T19:18:10.043403611Z" level=info msg="StopPodSandbox for \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\"" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.087 [INFO][3869] k8s.go 578: Cleaning up netns ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.087 [INFO][3869] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" iface="eth0" netns="/var/run/netns/cni-a659313e-e8ab-0102-44ac-931d7f702961" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.087 [INFO][3869] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" iface="eth0" netns="/var/run/netns/cni-a659313e-e8ab-0102-44ac-931d7f702961" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.088 [INFO][3869] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" iface="eth0" netns="/var/run/netns/cni-a659313e-e8ab-0102-44ac-931d7f702961" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.088 [INFO][3869] k8s.go 585: Releasing IP address(es) ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.088 [INFO][3869] utils.go 188: Calico CNI releasing IP address ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.104 [INFO][3875] ipam_plugin.go 415: Releasing address using handleID ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" HandleID="k8s-pod-network.b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.104 [INFO][3875] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.104 [INFO][3875] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.114 [WARNING][3875] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" HandleID="k8s-pod-network.b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.114 [INFO][3875] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" HandleID="k8s-pod-network.b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.115 [INFO][3875] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:10.118044 env[1346]: 2024-02-12 19:18:10.116 [INFO][3869] k8s.go 591: Teardown processing complete. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:10.120001 systemd[1]: run-netns-cni\x2da659313e\x2de8ab\x2d0102\x2d44ac\x2d931d7f702961.mount: Deactivated successfully. Feb 12 19:18:10.121101 env[1346]: time="2024-02-12T19:18:10.121065080Z" level=info msg="TearDown network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\" successfully" Feb 12 19:18:10.121185 env[1346]: time="2024-02-12T19:18:10.121169958Z" level=info msg="StopPodSandbox for \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\" returns successfully" Feb 12 19:18:10.121932 env[1346]: time="2024-02-12T19:18:10.121888821Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5fvxj,Uid:bad1b19d-6a8d-414f-ac13-5085154ffaf6,Namespace:kube-system,Attempt:1,}" Feb 12 19:18:10.288403 systemd-networkd[1500]: caliedb06ed26e7: Link UP Feb 12 19:18:10.298825 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliedb06ed26e7: link becomes ready Feb 12 19:18:10.299497 systemd-networkd[1500]: caliedb06ed26e7: Gained carrier Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.201 [INFO][3881] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0 coredns-5d78c9869d- kube-system bad1b19d-6a8d-414f-ac13-5085154ffaf6 727 0 2024-02-12 19:17:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-d216911d7c coredns-5d78c9869d-5fvxj eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliedb06ed26e7 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Namespace="kube-system" Pod="coredns-5d78c9869d-5fvxj" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.201 [INFO][3881] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Namespace="kube-system" Pod="coredns-5d78c9869d-5fvxj" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.229 [INFO][3893] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" HandleID="k8s-pod-network.4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.241 [INFO][3893] ipam_plugin.go 268: Auto assigning IP ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" HandleID="k8s-pod-network.4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002df230), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-d216911d7c", "pod":"coredns-5d78c9869d-5fvxj", "timestamp":"2024-02-12 19:18:10.22898942 +0000 UTC"}, Hostname:"ci-3510.3.2-a-d216911d7c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.241 [INFO][3893] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.241 [INFO][3893] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.241 [INFO][3893] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-d216911d7c' Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.243 [INFO][3893] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.248 [INFO][3893] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.251 [INFO][3893] ipam.go 489: Trying affinity for 192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.254 [INFO][3893] ipam.go 155: Attempting to load block cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.266 [INFO][3893] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.266 [INFO][3893] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.128/26 handle="k8s-pod-network.4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.271 [INFO][3893] ipam.go 1682: Creating new handle: k8s-pod-network.4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467 Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.275 [INFO][3893] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.128/26 handle="k8s-pod-network.4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.283 [INFO][3893] ipam.go 1216: Successfully claimed IPs: [192.168.7.131/26] block=192.168.7.128/26 handle="k8s-pod-network.4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.283 [INFO][3893] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.131/26] handle="k8s-pod-network.4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.284 [INFO][3893] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:10.312591 env[1346]: 2024-02-12 19:18:10.284 [INFO][3893] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.131/26] IPv6=[] ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" HandleID="k8s-pod-network.4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.313434 env[1346]: 2024-02-12 19:18:10.285 [INFO][3881] k8s.go 385: Populated endpoint ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Namespace="kube-system" Pod="coredns-5d78c9869d-5fvxj" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bad1b19d-6a8d-414f-ac13-5085154ffaf6", ResourceVersion:"727", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"", Pod:"coredns-5d78c9869d-5fvxj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliedb06ed26e7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:10.313434 env[1346]: 2024-02-12 19:18:10.285 [INFO][3881] k8s.go 386: Calico CNI using IPs: [192.168.7.131/32] ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Namespace="kube-system" Pod="coredns-5d78c9869d-5fvxj" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.313434 env[1346]: 2024-02-12 19:18:10.286 [INFO][3881] dataplane_linux.go 68: Setting the host side veth name to caliedb06ed26e7 ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Namespace="kube-system" Pod="coredns-5d78c9869d-5fvxj" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.313434 env[1346]: 2024-02-12 19:18:10.288 [INFO][3881] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Namespace="kube-system" Pod="coredns-5d78c9869d-5fvxj" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.313434 env[1346]: 2024-02-12 19:18:10.288 [INFO][3881] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Namespace="kube-system" Pod="coredns-5d78c9869d-5fvxj" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bad1b19d-6a8d-414f-ac13-5085154ffaf6", ResourceVersion:"727", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467", Pod:"coredns-5d78c9869d-5fvxj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliedb06ed26e7", MAC:"42:a5:15:59:a1:82", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:10.313434 env[1346]: 2024-02-12 19:18:10.306 [INFO][3881] k8s.go 491: Wrote updated endpoint to datastore ContainerID="4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467" Namespace="kube-system" Pod="coredns-5d78c9869d-5fvxj" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:10.334332 env[1346]: time="2024-02-12T19:18:10.334144063Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:10.334332 env[1346]: time="2024-02-12T19:18:10.334180702Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:10.334332 env[1346]: time="2024-02-12T19:18:10.334190821Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:10.334820 env[1346]: time="2024-02-12T19:18:10.334604532Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467 pid=3924 runtime=io.containerd.runc.v2 Feb 12 19:18:10.336000 audit[3931]: NETFILTER_CFG table=filter:106 family=2 entries=44 op=nft_register_chain pid=3931 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:10.336000 audit[3931]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=22284 a0=3 a1=ffffd9838370 a2=0 a3=ffffaf11efa8 items=0 ppid=3473 pid=3931 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.336000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:10.346078 systemd[1]: Started cri-containerd-4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467.scope. Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.359000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.360000 audit: BPF prog-id=160 op=LOAD Feb 12 19:18:10.360000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.360000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=3924 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663930353261313438363131373534623138366531613431666635 Feb 12 19:18:10.360000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.360000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=3924 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663930353261313438363131373534623138366531613431666635 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit: BPF prog-id=161 op=LOAD Feb 12 19:18:10.361000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=3924 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663930353261313438363131373534623138366531613431666635 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.361000 audit: BPF prog-id=162 op=LOAD Feb 12 19:18:10.361000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=3924 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.361000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663930353261313438363131373534623138366531613431666635 Feb 12 19:18:10.362000 audit: BPF prog-id=162 op=UNLOAD Feb 12 19:18:10.362000 audit: BPF prog-id=161 op=UNLOAD Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { perfmon } for pid=3937 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit[3937]: AVC avc: denied { bpf } for pid=3937 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.362000 audit: BPF prog-id=163 op=LOAD Feb 12 19:18:10.362000 audit[3937]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=3924 pid=3937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3463663930353261313438363131373534623138366531613431666635 Feb 12 19:18:10.387173 env[1346]: time="2024-02-12T19:18:10.387117895Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-5fvxj,Uid:bad1b19d-6a8d-414f-ac13-5085154ffaf6,Namespace:kube-system,Attempt:1,} returns sandbox id \"4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467\"" Feb 12 19:18:10.391715 env[1346]: time="2024-02-12T19:18:10.391672791Z" level=info msg="CreateContainer within sandbox \"4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:18:10.416923 systemd-networkd[1500]: cali22608793518: Gained IPv6LL Feb 12 19:18:10.448860 env[1346]: time="2024-02-12T19:18:10.448811528Z" level=info msg="CreateContainer within sandbox \"4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"aeaa33a9969684385aa29fb15d157ee68e3e9b014b057401469e23ae16812d9d\"" Feb 12 19:18:10.451556 env[1346]: time="2024-02-12T19:18:10.449847745Z" level=info msg="StartContainer for \"aeaa33a9969684385aa29fb15d157ee68e3e9b014b057401469e23ae16812d9d\"" Feb 12 19:18:10.477119 systemd[1]: run-containerd-runc-k8s.io-aeaa33a9969684385aa29fb15d157ee68e3e9b014b057401469e23ae16812d9d-runc.ORZl16.mount: Deactivated successfully. Feb 12 19:18:10.481696 systemd[1]: Started cri-containerd-aeaa33a9969684385aa29fb15d157ee68e3e9b014b057401469e23ae16812d9d.scope. Feb 12 19:18:10.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.494000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.494000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.495000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.495000 audit: BPF prog-id=164 op=LOAD Feb 12 19:18:10.495000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.495000 audit[3968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3924 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165616133336139393639363834333835616132396662313564313537 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3924 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165616133336139393639363834333835616132396662313564313537 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.496000 audit: BPF prog-id=165 op=LOAD Feb 12 19:18:10.496000 audit[3968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3924 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.496000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165616133336139393639363834333835616132396662313564313537 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit: BPF prog-id=166 op=LOAD Feb 12 19:18:10.497000 audit[3968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3924 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165616133336139393639363834333835616132396662313564313537 Feb 12 19:18:10.497000 audit: BPF prog-id=166 op=UNLOAD Feb 12 19:18:10.497000 audit: BPF prog-id=165 op=UNLOAD Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { perfmon } for pid=3968 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit[3968]: AVC avc: denied { bpf } for pid=3968 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:10.497000 audit: BPF prog-id=167 op=LOAD Feb 12 19:18:10.497000 audit[3968]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3924 pid=3968 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:10.497000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165616133336139393639363834333835616132396662313564313537 Feb 12 19:18:10.518210 env[1346]: time="2024-02-12T19:18:10.518167187Z" level=info msg="StartContainer for \"aeaa33a9969684385aa29fb15d157ee68e3e9b014b057401469e23ae16812d9d\" returns successfully" Feb 12 19:18:10.672951 systemd-networkd[1500]: cali59f0807b11b: Gained IPv6LL Feb 12 19:18:11.045668 env[1346]: time="2024-02-12T19:18:11.045637294Z" level=info msg="StopPodSandbox for \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\"" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.124 [INFO][4018] k8s.go 578: Cleaning up netns ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.124 [INFO][4018] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" iface="eth0" netns="/var/run/netns/cni-5daf5dce-0c61-717b-31e8-2ae42ad5b6e9" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.124 [INFO][4018] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" iface="eth0" netns="/var/run/netns/cni-5daf5dce-0c61-717b-31e8-2ae42ad5b6e9" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.125 [INFO][4018] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" iface="eth0" netns="/var/run/netns/cni-5daf5dce-0c61-717b-31e8-2ae42ad5b6e9" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.125 [INFO][4018] k8s.go 585: Releasing IP address(es) ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.125 [INFO][4018] utils.go 188: Calico CNI releasing IP address ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.172 [INFO][4025] ipam_plugin.go 415: Releasing address using handleID ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" HandleID="k8s-pod-network.91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.172 [INFO][4025] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.172 [INFO][4025] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.184 [WARNING][4025] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" HandleID="k8s-pod-network.91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.184 [INFO][4025] ipam_plugin.go 443: Releasing address using workloadID ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" HandleID="k8s-pod-network.91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.185 [INFO][4025] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:11.187775 env[1346]: 2024-02-12 19:18:11.186 [INFO][4018] k8s.go 591: Teardown processing complete. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:11.188762 env[1346]: time="2024-02-12T19:18:11.188706992Z" level=info msg="TearDown network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\" successfully" Feb 12 19:18:11.188848 env[1346]: time="2024-02-12T19:18:11.188832069Z" level=info msg="StopPodSandbox for \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\" returns successfully" Feb 12 19:18:11.189561 env[1346]: time="2024-02-12T19:18:11.189535014Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8cd7j,Uid:2b4537c7-703c-4fb7-865e-ca2b24bf23c8,Namespace:kube-system,Attempt:1,}" Feb 12 19:18:11.256556 kubelet[2463]: I0212 19:18:11.256435 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-5fvxj" podStartSLOduration=36.256395908 podCreationTimestamp="2024-02-12 19:17:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:18:11.256384348 +0000 UTC m=+48.359573355" watchObservedRunningTime="2024-02-12 19:18:11.256395908 +0000 UTC m=+48.359584875" Feb 12 19:18:11.329000 audit[4048]: NETFILTER_CFG table=filter:107 family=2 entries=14 op=nft_register_rule pid=4048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:11.329000 audit[4048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffc18e4e50 a2=0 a3=ffff9e6dc6c0 items=0 ppid=2641 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.329000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:11.332000 audit[4048]: NETFILTER_CFG table=nat:108 family=2 entries=14 op=nft_register_rule pid=4048 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:11.332000 audit[4048]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3300 a0=3 a1=ffffc18e4e50 a2=0 a3=ffff9e6dc6c0 items=0 ppid=2641 pid=4048 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.332000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:11.351000 audit[4055]: NETFILTER_CFG table=filter:109 family=2 entries=11 op=nft_register_rule pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:11.351000 audit[4055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffcb9fa600 a2=0 a3=ffffb82606c0 items=0 ppid=2641 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:11.352000 audit[4055]: NETFILTER_CFG table=nat:110 family=2 entries=35 op=nft_register_chain pid=4055 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:11.352000 audit[4055]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=ffffcb9fa600 a2=0 a3=ffffb82606c0 items=0 ppid=2641 pid=4055 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.352000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:11.408272 systemd-networkd[1500]: cali9adc184b09e: Link UP Feb 12 19:18:11.423375 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:18:11.423483 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9adc184b09e: link becomes ready Feb 12 19:18:11.423971 systemd-networkd[1500]: cali9adc184b09e: Gained carrier Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.314 [INFO][4033] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0 coredns-5d78c9869d- kube-system 2b4537c7-703c-4fb7-865e-ca2b24bf23c8 738 0 2024-02-12 19:17:35 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5d78c9869d projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-d216911d7c coredns-5d78c9869d-8cd7j eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali9adc184b09e [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Namespace="kube-system" Pod="coredns-5d78c9869d-8cd7j" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.314 [INFO][4033] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Namespace="kube-system" Pod="coredns-5d78c9869d-8cd7j" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.359 [INFO][4049] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" HandleID="k8s-pod-network.ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.376 [INFO][4049] ipam_plugin.go 268: Auto assigning IP ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" HandleID="k8s-pod-network.ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b47a0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-d216911d7c", "pod":"coredns-5d78c9869d-8cd7j", "timestamp":"2024-02-12 19:18:11.359845098 +0000 UTC"}, Hostname:"ci-3510.3.2-a-d216911d7c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.376 [INFO][4049] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.376 [INFO][4049] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.376 [INFO][4049] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-d216911d7c' Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.377 [INFO][4049] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.380 [INFO][4049] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.383 [INFO][4049] ipam.go 489: Trying affinity for 192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.384 [INFO][4049] ipam.go 155: Attempting to load block cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.386 [INFO][4049] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.386 [INFO][4049] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.128/26 handle="k8s-pod-network.ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.388 [INFO][4049] ipam.go 1682: Creating new handle: k8s-pod-network.ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3 Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.390 [INFO][4049] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.128/26 handle="k8s-pod-network.ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.397 [INFO][4049] ipam.go 1216: Successfully claimed IPs: [192.168.7.132/26] block=192.168.7.128/26 handle="k8s-pod-network.ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.397 [INFO][4049] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.132/26] handle="k8s-pod-network.ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.397 [INFO][4049] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:11.436489 env[1346]: 2024-02-12 19:18:11.397 [INFO][4049] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.132/26] IPv6=[] ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" HandleID="k8s-pod-network.ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.437120 env[1346]: 2024-02-12 19:18:11.398 [INFO][4033] k8s.go 385: Populated endpoint ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Namespace="kube-system" Pod="coredns-5d78c9869d-8cd7j" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"2b4537c7-703c-4fb7-865e-ca2b24bf23c8", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"", Pod:"coredns-5d78c9869d-8cd7j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9adc184b09e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:11.437120 env[1346]: 2024-02-12 19:18:11.398 [INFO][4033] k8s.go 386: Calico CNI using IPs: [192.168.7.132/32] ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Namespace="kube-system" Pod="coredns-5d78c9869d-8cd7j" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.437120 env[1346]: 2024-02-12 19:18:11.398 [INFO][4033] dataplane_linux.go 68: Setting the host side veth name to cali9adc184b09e ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Namespace="kube-system" Pod="coredns-5d78c9869d-8cd7j" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.437120 env[1346]: 2024-02-12 19:18:11.424 [INFO][4033] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Namespace="kube-system" Pod="coredns-5d78c9869d-8cd7j" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.437120 env[1346]: 2024-02-12 19:18:11.425 [INFO][4033] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Namespace="kube-system" Pod="coredns-5d78c9869d-8cd7j" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"2b4537c7-703c-4fb7-865e-ca2b24bf23c8", ResourceVersion:"738", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3", Pod:"coredns-5d78c9869d-8cd7j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9adc184b09e", MAC:"3e:fb:34:c2:c3:3b", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:11.437120 env[1346]: 2024-02-12 19:18:11.434 [INFO][4033] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3" Namespace="kube-system" Pod="coredns-5d78c9869d-8cd7j" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:11.440532 systemd[1]: run-netns-cni\x2d5daf5dce\x2d0c61\x2d717b\x2d31e8\x2d2ae42ad5b6e9.mount: Deactivated successfully. Feb 12 19:18:11.463000 audit[4068]: NETFILTER_CFG table=filter:111 family=2 entries=38 op=nft_register_chain pid=4068 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:11.463000 audit[4068]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19088 a0=3 a1=ffffe1d71610 a2=0 a3=ffff995befa8 items=0 ppid=3473 pid=4068 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.463000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:11.496469 env[1346]: time="2024-02-12T19:18:11.496394903Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:11.496469 env[1346]: time="2024-02-12T19:18:11.496438502Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:11.496713 env[1346]: time="2024-02-12T19:18:11.496666616Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:11.497852 env[1346]: time="2024-02-12T19:18:11.497810071Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3 pid=4079 runtime=io.containerd.runc.v2 Feb 12 19:18:11.530811 systemd[1]: run-containerd-runc-k8s.io-ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3-runc.tlbQOC.mount: Deactivated successfully. Feb 12 19:18:11.532359 systemd[1]: Started cri-containerd-ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3.scope. Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.549000 audit: BPF prog-id=168 op=LOAD Feb 12 19:18:11.550000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.550000 audit[4090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bfb38 a2=10 a3=0 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346232313161656632333566643732623031303865393866303365 Feb 12 19:18:11.550000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.550000 audit[4090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bf5a0 a2=3c a3=0 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.550000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346232313161656632333566643732623031303865393866303365 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit: BPF prog-id=169 op=LOAD Feb 12 19:18:11.551000 audit[4090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bf8e0 a2=78 a3=0 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346232313161656632333566643732623031303865393866303365 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.551000 audit: BPF prog-id=170 op=LOAD Feb 12 19:18:11.551000 audit[4090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bf670 a2=78 a3=0 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.551000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346232313161656632333566643732623031303865393866303365 Feb 12 19:18:11.552000 audit: BPF prog-id=170 op=UNLOAD Feb 12 19:18:11.552000 audit: BPF prog-id=169 op=UNLOAD Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { perfmon } for pid=4090 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit[4090]: AVC avc: denied { bpf } for pid=4090 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.552000 audit: BPF prog-id=171 op=LOAD Feb 12 19:18:11.552000 audit[4090]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bfb40 a2=78 a3=0 items=0 ppid=4079 pid=4090 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.552000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6563346232313161656632333566643732623031303865393866303365 Feb 12 19:18:11.576222 env[1346]: time="2024-02-12T19:18:11.576169386Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5d78c9869d-8cd7j,Uid:2b4537c7-703c-4fb7-865e-ca2b24bf23c8,Namespace:kube-system,Attempt:1,} returns sandbox id \"ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3\"" Feb 12 19:18:11.579394 env[1346]: time="2024-02-12T19:18:11.579358634Z" level=info msg="CreateContainer within sandbox \"ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:18:11.651868 env[1346]: time="2024-02-12T19:18:11.649987283Z" level=info msg="CreateContainer within sandbox \"ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b886616521ebe91b1cf264eec9c51d6b5966812351ad2285a548170d3d02896d\"" Feb 12 19:18:11.654760 env[1346]: time="2024-02-12T19:18:11.654690617Z" level=info msg="StartContainer for \"b886616521ebe91b1cf264eec9c51d6b5966812351ad2285a548170d3d02896d\"" Feb 12 19:18:11.668418 systemd[1]: Started cri-containerd-b886616521ebe91b1cf264eec9c51d6b5966812351ad2285a548170d3d02896d.scope. Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.692000 audit: BPF prog-id=172 op=LOAD Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4079 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238383636313635323165626539316231636632363465656339633531 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4079 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238383636313635323165626539316231636632363465656339633531 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit: BPF prog-id=173 op=LOAD Feb 12 19:18:11.693000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4079 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238383636313635323165626539316231636632363465656339633531 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit: BPF prog-id=174 op=LOAD Feb 12 19:18:11.693000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4079 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238383636313635323165626539316231636632363465656339633531 Feb 12 19:18:11.693000 audit: BPF prog-id=174 op=UNLOAD Feb 12 19:18:11.693000 audit: BPF prog-id=173 op=UNLOAD Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { perfmon } for pid=4122 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit[4122]: AVC avc: denied { bpf } for pid=4122 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.693000 audit: BPF prog-id=175 op=LOAD Feb 12 19:18:11.693000 audit[4122]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4079 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.693000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6238383636313635323165626539316231636632363465656339633531 Feb 12 19:18:11.717214 env[1346]: time="2024-02-12T19:18:11.717150531Z" level=info msg="StartContainer for \"b886616521ebe91b1cf264eec9c51d6b5966812351ad2285a548170d3d02896d\" returns successfully" Feb 12 19:18:11.819862 env[1346]: time="2024-02-12T19:18:11.819808139Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:11.828419 env[1346]: time="2024-02-12T19:18:11.828375146Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:11.832555 env[1346]: time="2024-02-12T19:18:11.832506333Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:11.840821 env[1346]: time="2024-02-12T19:18:11.840779706Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:11.841433 env[1346]: time="2024-02-12T19:18:11.841405852Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 12 19:18:11.845531 env[1346]: time="2024-02-12T19:18:11.845503400Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:18:11.848922 env[1346]: time="2024-02-12T19:18:11.848891284Z" level=info msg="CreateContainer within sandbox \"2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:18:11.899352 env[1346]: time="2024-02-12T19:18:11.899299868Z" level=info msg="CreateContainer within sandbox \"2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647\"" Feb 12 19:18:11.900080 env[1346]: time="2024-02-12T19:18:11.900049692Z" level=info msg="StartContainer for \"a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647\"" Feb 12 19:18:11.916442 systemd[1]: Started cri-containerd-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647.scope. Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.936000 audit: BPF prog-id=176 op=LOAD Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3717 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393932383339636238383738386665646664306630396537356330 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3717 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393932383339636238383738386665646664306630396537356330 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.937000 audit: BPF prog-id=177 op=LOAD Feb 12 19:18:11.937000 audit[4163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3717 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.937000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393932383339636238383738386665646664306630396537356330 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit: BPF prog-id=178 op=LOAD Feb 12 19:18:11.938000 audit[4163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3717 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393932383339636238383738386665646664306630396537356330 Feb 12 19:18:11.938000 audit: BPF prog-id=178 op=UNLOAD Feb 12 19:18:11.938000 audit: BPF prog-id=177 op=UNLOAD Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { perfmon } for pid=4163 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit[4163]: AVC avc: denied { bpf } for pid=4163 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:11.938000 audit: BPF prog-id=179 op=LOAD Feb 12 19:18:11.938000 audit[4163]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3717 pid=4163 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:11.938000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393932383339636238383738386665646664306630396537356330 Feb 12 19:18:12.064525 env[1346]: time="2024-02-12T19:18:12.064475285Z" level=info msg="StartContainer for \"a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647\" returns successfully" Feb 12 19:18:12.144908 systemd-networkd[1500]: caliedb06ed26e7: Gained IPv6LL Feb 12 19:18:12.261543 kubelet[2463]: I0212 19:18:12.261427 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5d78c9869d-8cd7j" podStartSLOduration=37.261392663 podCreationTimestamp="2024-02-12 19:17:35 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:18:12.260989752 +0000 UTC m=+49.364178799" watchObservedRunningTime="2024-02-12 19:18:12.261392663 +0000 UTC m=+49.364581630" Feb 12 19:18:12.288461 kubelet[2463]: I0212 19:18:12.288335 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-c875bd866-4pxqw" podStartSLOduration=26.684561568 podCreationTimestamp="2024-02-12 19:17:43 +0000 UTC" firstStartedPulling="2024-02-12 19:18:09.238163545 +0000 UTC m=+46.341352552" lastFinishedPulling="2024-02-12 19:18:11.841898281 +0000 UTC m=+48.945087368" observedRunningTime="2024-02-12 19:18:12.287674038 +0000 UTC m=+49.390863045" watchObservedRunningTime="2024-02-12 19:18:12.288296384 +0000 UTC m=+49.391485391" Feb 12 19:18:12.317000 audit[4203]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=4203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:12.317000 audit[4203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=fffff8255020 a2=0 a3=ffff9f09f6c0 items=0 ppid=2641 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.317000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:12.319000 audit[4203]: NETFILTER_CFG table=nat:113 family=2 entries=44 op=nft_register_rule pid=4203 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:12.319000 audit[4203]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13788 a0=3 a1=fffff8255020 a2=0 a3=ffff9f09f6c0 items=0 ppid=2641 pid=4203 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:12.319000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:12.442126 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4153837843.mount: Deactivated successfully. Feb 12 19:18:12.656940 systemd-networkd[1500]: cali9adc184b09e: Gained IPv6LL Feb 12 19:18:13.083506 env[1346]: time="2024-02-12T19:18:13.083455350Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:13.093454 env[1346]: time="2024-02-12T19:18:13.093410211Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:13.099035 env[1346]: time="2024-02-12T19:18:13.098998568Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:13.105151 env[1346]: time="2024-02-12T19:18:13.105113793Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:13.105563 env[1346]: time="2024-02-12T19:18:13.105532304Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:18:13.109279 env[1346]: time="2024-02-12T19:18:13.109230023Z" level=info msg="CreateContainer within sandbox \"5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:18:13.155250 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount849827854.mount: Deactivated successfully. Feb 12 19:18:13.173502 env[1346]: time="2024-02-12T19:18:13.173455770Z" level=info msg="CreateContainer within sandbox \"5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"6a81ae9010ff841344b068bad5686d1566d9a8033985c17b0423e4fc4a93852b\"" Feb 12 19:18:13.175961 env[1346]: time="2024-02-12T19:18:13.175060095Z" level=info msg="StartContainer for \"6a81ae9010ff841344b068bad5686d1566d9a8033985c17b0423e4fc4a93852b\"" Feb 12 19:18:13.213566 systemd[1]: Started cri-containerd-6a81ae9010ff841344b068bad5686d1566d9a8033985c17b0423e4fc4a93852b.scope. Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=400011d5a0 a2=3c a3=0 items=0 ppid=3820 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:13.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661383161653930313066663834313334346230363862616435363836 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.227000 audit: BPF prog-id=180 op=LOAD Feb 12 19:18:13.227000 audit[4223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011d8e0 a2=78 a3=0 items=0 ppid=3820 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:13.227000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661383161653930313066663834313334346230363862616435363836 Feb 12 19:18:13.228000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.228000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.228000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.228000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.228000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.228000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.228000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.228000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.228000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.228000 audit: BPF prog-id=181 op=LOAD Feb 12 19:18:13.228000 audit[4223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=400011d670 a2=78 a3=0 items=0 ppid=3820 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:13.228000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661383161653930313066663834313334346230363862616435363836 Feb 12 19:18:13.229000 audit: BPF prog-id=181 op=UNLOAD Feb 12 19:18:13.229000 audit: BPF prog-id=180 op=UNLOAD Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:13.229000 audit: BPF prog-id=182 op=LOAD Feb 12 19:18:13.229000 audit[4223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=400011db40 a2=78 a3=0 items=0 ppid=3820 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:13.229000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3661383161653930313066663834313334346230363862616435363836 Feb 12 19:18:13.255838 env[1346]: time="2024-02-12T19:18:13.255780039Z" level=info msg="StartContainer for \"6a81ae9010ff841344b068bad5686d1566d9a8033985c17b0423e4fc4a93852b\" returns successfully" Feb 12 19:18:13.258002 env[1346]: time="2024-02-12T19:18:13.257579000Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:18:13.330000 audit[4250]: NETFILTER_CFG table=filter:114 family=2 entries=8 op=nft_register_rule pid=4250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:13.330000 audit[4250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd7b74930 a2=0 a3=ffffae9fe6c0 items=0 ppid=2641 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:13.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:13.335000 audit[4250]: NETFILTER_CFG table=nat:115 family=2 entries=56 op=nft_register_chain pid=4250 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:13.335000 audit[4250]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=19452 a0=3 a1=ffffd7b74930 a2=0 a3=ffffae9fe6c0 items=0 ppid=2641 pid=4250 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:13.335000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:13.440014 systemd[1]: run-containerd-runc-k8s.io-6a81ae9010ff841344b068bad5686d1566d9a8033985c17b0423e4fc4a93852b-runc.fPISUD.mount: Deactivated successfully. Feb 12 19:18:14.818166 env[1346]: time="2024-02-12T19:18:14.818110319Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:14.828841 env[1346]: time="2024-02-12T19:18:14.828791206Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:14.836638 env[1346]: time="2024-02-12T19:18:14.836598717Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:14.842934 env[1346]: time="2024-02-12T19:18:14.842883300Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:14.843347 env[1346]: time="2024-02-12T19:18:14.843316171Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:18:14.845962 env[1346]: time="2024-02-12T19:18:14.845922634Z" level=info msg="CreateContainer within sandbox \"5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:18:14.893858 env[1346]: time="2024-02-12T19:18:14.893800593Z" level=info msg="CreateContainer within sandbox \"5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"1062623f29aa755b3fbf49b1abe98479d3e0ff9f4b0377b2781404cd49af50c2\"" Feb 12 19:18:14.894659 env[1346]: time="2024-02-12T19:18:14.894633415Z" level=info msg="StartContainer for \"1062623f29aa755b3fbf49b1abe98479d3e0ff9f4b0377b2781404cd49af50c2\"" Feb 12 19:18:14.924863 systemd[1]: run-containerd-runc-k8s.io-1062623f29aa755b3fbf49b1abe98479d3e0ff9f4b0377b2781404cd49af50c2-runc.Yrjsa1.mount: Deactivated successfully. Feb 12 19:18:14.930220 systemd[1]: Started cri-containerd-1062623f29aa755b3fbf49b1abe98479d3e0ff9f4b0377b2781404cd49af50c2.scope. Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.970901 kernel: kauditd_printk_skb: 468 callbacks suppressed Feb 12 19:18:14.971055 kernel: audit: type=1400 audit(1707765494.960:1321): avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3820 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:15.025312 kernel: audit: type=1300 audit(1707765494.960:1321): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001155a0 a2=3c a3=0 items=0 ppid=3820 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363236323366323961613735356233666266343962316162653938 Feb 12 19:18:15.054006 kernel: audit: type=1327 audit(1707765494.960:1321): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363236323366323961613735356233666266343962316162653938 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.079810 kernel: audit: type=1400 audit(1707765494.960:1322): avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.101588 kernel: audit: type=1400 audit(1707765494.960:1322): avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.102213 env[1346]: time="2024-02-12T19:18:15.102165006Z" level=info msg="StartContainer for \"1062623f29aa755b3fbf49b1abe98479d3e0ff9f4b0377b2781404cd49af50c2\" returns successfully" Feb 12 19:18:15.120433 kernel: audit: type=1400 audit(1707765494.960:1322): avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.140172 kernel: audit: type=1400 audit(1707765494.960:1322): avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.160055 kernel: audit: type=1400 audit(1707765494.960:1322): avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.165963 kubelet[2463]: I0212 19:18:15.165750 2463 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:18:15.165963 kubelet[2463]: I0212 19:18:15.165776 2463 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:18:15.180009 kernel: audit: type=1400 audit(1707765494.960:1322): avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:15.199731 kernel: audit: type=1400 audit(1707765494.960:1322): avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit: BPF prog-id=183 op=LOAD Feb 12 19:18:14.960000 audit[4262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001158e0 a2=78 a3=0 items=0 ppid=3820 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363236323366323961613735356233666266343962316162653938 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit: BPF prog-id=184 op=LOAD Feb 12 19:18:14.960000 audit[4262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000115670 a2=78 a3=0 items=0 ppid=3820 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363236323366323961613735356233666266343962316162653938 Feb 12 19:18:14.960000 audit: BPF prog-id=184 op=UNLOAD Feb 12 19:18:14.960000 audit: BPF prog-id=183 op=UNLOAD Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { perfmon } for pid=4262 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit[4262]: AVC avc: denied { bpf } for pid=4262 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:14.960000 audit: BPF prog-id=185 op=LOAD Feb 12 19:18:14.960000 audit[4262]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000115b40 a2=78 a3=0 items=0 ppid=3820 pid=4262 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:14.960000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3130363236323366323961613735356233666266343962316162653938 Feb 12 19:18:15.279146 kubelet[2463]: I0212 19:18:15.279096 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-d8zcl" podStartSLOduration=26.961123268 podCreationTimestamp="2024-02-12 19:17:43 +0000 UTC" firstStartedPulling="2024-02-12 19:18:09.52563747 +0000 UTC m=+46.628826477" lastFinishedPulling="2024-02-12 19:18:14.843573205 +0000 UTC m=+51.946762212" observedRunningTime="2024-02-12 19:18:15.277219522 +0000 UTC m=+52.380408529" watchObservedRunningTime="2024-02-12 19:18:15.279059003 +0000 UTC m=+52.382248010" Feb 12 19:18:18.478976 systemd[1]: run-containerd-runc-k8s.io-baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c-runc.GnROuq.mount: Deactivated successfully. Feb 12 19:18:18.963000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:18.963000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000c8abc0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:18:18.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:18.963000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:18.963000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001402f60 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:18:18.963000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:19.142000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:19.142000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4009df1d40 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:18:19.142000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:19.142000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:19.142000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4009f3c150 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:18:19.142000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:19.181000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:19.181000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:19.181000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4009f3c990 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:18:19.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:19.181000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4009fb9400 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:18:19.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:19.183000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:19.183000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4009fb9540 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:18:19.183000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:19.183000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:19.183000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6a a1=4009f3c9c0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:18:19.183000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:18:22.223997 kubelet[2463]: I0212 19:18:22.223959 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:18:22.228670 systemd[1]: Created slice kubepods-besteffort-pode15af4a9_29e1_42e4_aca2_13eafb070f36.slice. Feb 12 19:18:22.241763 kubelet[2463]: I0212 19:18:22.241736 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/e15af4a9-29e1-42e4-aca2-13eafb070f36-calico-apiserver-certs\") pod \"calico-apiserver-6bb88c845d-q662m\" (UID: \"e15af4a9-29e1-42e4-aca2-13eafb070f36\") " pod="calico-apiserver/calico-apiserver-6bb88c845d-q662m" Feb 12 19:18:22.242048 kubelet[2463]: I0212 19:18:22.242035 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-px25t\" (UniqueName: \"kubernetes.io/projected/e15af4a9-29e1-42e4-aca2-13eafb070f36-kube-api-access-px25t\") pod \"calico-apiserver-6bb88c845d-q662m\" (UID: \"e15af4a9-29e1-42e4-aca2-13eafb070f36\") " pod="calico-apiserver/calico-apiserver-6bb88c845d-q662m" Feb 12 19:18:22.247109 kubelet[2463]: I0212 19:18:22.247076 2463 topology_manager.go:212] "Topology Admit Handler" Feb 12 19:18:22.251925 systemd[1]: Created slice kubepods-besteffort-pod44831832_c85f_4ec4_928f_9e48d7125372.slice. Feb 12 19:18:22.280000 audit[4328]: NETFILTER_CFG table=filter:116 family=2 entries=9 op=nft_register_rule pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:22.287142 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 19:18:22.287268 kernel: audit: type=1325 audit(1707765502.280:1335): table=filter:116 family=2 entries=9 op=nft_register_rule pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:22.280000 audit[4328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd37efdc0 a2=0 a3=ffff9bad96c0 items=0 ppid=2641 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.334275 kernel: audit: type=1300 audit(1707765502.280:1335): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd37efdc0 a2=0 a3=ffff9bad96c0 items=0 ppid=2641 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.334764 kernel: audit: type=1327 audit(1707765502.280:1335): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:22.280000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:22.342451 kubelet[2463]: I0212 19:18:22.342422 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/44831832-c85f-4ec4-928f-9e48d7125372-calico-apiserver-certs\") pod \"calico-apiserver-6bb88c845d-tp6tp\" (UID: \"44831832-c85f-4ec4-928f-9e48d7125372\") " pod="calico-apiserver/calico-apiserver-6bb88c845d-tp6tp" Feb 12 19:18:22.342653 kubelet[2463]: I0212 19:18:22.342642 2463 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-7l7xw\" (UniqueName: \"kubernetes.io/projected/44831832-c85f-4ec4-928f-9e48d7125372-kube-api-access-7l7xw\") pod \"calico-apiserver-6bb88c845d-tp6tp\" (UID: \"44831832-c85f-4ec4-928f-9e48d7125372\") " pod="calico-apiserver/calico-apiserver-6bb88c845d-tp6tp" Feb 12 19:18:22.343089 kubelet[2463]: E0212 19:18:22.343069 2463 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:18:22.343245 kubelet[2463]: E0212 19:18:22.343233 2463 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/e15af4a9-29e1-42e4-aca2-13eafb070f36-calico-apiserver-certs podName:e15af4a9-29e1-42e4-aca2-13eafb070f36 nodeName:}" failed. No retries permitted until 2024-02-12 19:18:22.843213106 +0000 UTC m=+59.946402113 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/e15af4a9-29e1-42e4-aca2-13eafb070f36-calico-apiserver-certs") pod "calico-apiserver-6bb88c845d-q662m" (UID: "e15af4a9-29e1-42e4-aca2-13eafb070f36") : secret "calico-apiserver-certs" not found Feb 12 19:18:22.303000 audit[4328]: NETFILTER_CFG table=nat:117 family=2 entries=20 op=nft_register_rule pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:22.303000 audit[4328]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd37efdc0 a2=0 a3=ffff9bad96c0 items=0 ppid=2641 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.399902 kernel: audit: type=1325 audit(1707765502.303:1336): table=nat:117 family=2 entries=20 op=nft_register_rule pid=4328 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:22.400057 kernel: audit: type=1300 audit(1707765502.303:1336): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffd37efdc0 a2=0 a3=ffff9bad96c0 items=0 ppid=2641 pid=4328 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.303000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:22.424940 kernel: audit: type=1327 audit(1707765502.303:1336): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:22.426000 audit[4331]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:22.443946 kubelet[2463]: E0212 19:18:22.443911 2463 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:18:22.444210 kubelet[2463]: E0212 19:18:22.444184 2463 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/44831832-c85f-4ec4-928f-9e48d7125372-calico-apiserver-certs podName:44831832-c85f-4ec4-928f-9e48d7125372 nodeName:}" failed. No retries permitted until 2024-02-12 19:18:22.944166167 +0000 UTC m=+60.047355134 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/44831832-c85f-4ec4-928f-9e48d7125372-calico-apiserver-certs") pod "calico-apiserver-6bb88c845d-tp6tp" (UID: "44831832-c85f-4ec4-928f-9e48d7125372") : secret "calico-apiserver-certs" not found Feb 12 19:18:22.444750 kernel: audit: type=1325 audit(1707765502.426:1337): table=filter:118 family=2 entries=10 op=nft_register_rule pid=4331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:22.444833 kernel: audit: type=1300 audit(1707765502.426:1337): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcd8eb500 a2=0 a3=ffffaf5176c0 items=0 ppid=2641 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.426000 audit[4331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffcd8eb500 a2=0 a3=ffffaf5176c0 items=0 ppid=2641 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.426000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:22.492749 kernel: audit: type=1327 audit(1707765502.426:1337): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:22.492861 kernel: audit: type=1325 audit(1707765502.428:1338): table=nat:119 family=2 entries=20 op=nft_register_rule pid=4331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:22.428000 audit[4331]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4331 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:22.428000 audit[4331]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffcd8eb500 a2=0 a3=ffffaf5176c0 items=0 ppid=2641 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:22.428000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:23.040747 env[1346]: time="2024-02-12T19:18:23.040377928Z" level=info msg="StopPodSandbox for \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\"" Feb 12 19:18:23.133551 env[1346]: time="2024-02-12T19:18:23.133512043Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb88c845d-q662m,Uid:e15af4a9-29e1-42e4-aca2-13eafb070f36,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.085 [WARNING][4348] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bad1b19d-6a8d-414f-ac13-5085154ffaf6", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467", Pod:"coredns-5d78c9869d-5fvxj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliedb06ed26e7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.085 [INFO][4348] k8s.go 578: Cleaning up netns ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.086 [INFO][4348] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" iface="eth0" netns="" Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.086 [INFO][4348] k8s.go 585: Releasing IP address(es) ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.086 [INFO][4348] utils.go 188: Calico CNI releasing IP address ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.116 [INFO][4357] ipam_plugin.go 415: Releasing address using handleID ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" HandleID="k8s-pod-network.b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.117 [INFO][4357] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.117 [INFO][4357] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.128 [WARNING][4357] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" HandleID="k8s-pod-network.b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.128 [INFO][4357] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" HandleID="k8s-pod-network.b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.130 [INFO][4357] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:23.134305 env[1346]: 2024-02-12 19:18:23.131 [INFO][4348] k8s.go 591: Teardown processing complete. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:23.134818 env[1346]: time="2024-02-12T19:18:23.134787178Z" level=info msg="TearDown network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\" successfully" Feb 12 19:18:23.134901 env[1346]: time="2024-02-12T19:18:23.134884936Z" level=info msg="StopPodSandbox for \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\" returns successfully" Feb 12 19:18:23.135690 env[1346]: time="2024-02-12T19:18:23.135655561Z" level=info msg="RemovePodSandbox for \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\"" Feb 12 19:18:23.135906 env[1346]: time="2024-02-12T19:18:23.135865876Z" level=info msg="Forcibly stopping sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\"" Feb 12 19:18:23.156626 env[1346]: time="2024-02-12T19:18:23.156580066Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb88c845d-tp6tp,Uid:44831832-c85f-4ec4-928f-9e48d7125372,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.182 [WARNING][4376] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"bad1b19d-6a8d-414f-ac13-5085154ffaf6", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"4cf9052a148611754b186e1a41ff554814b515892608d0914da696b102164467", Pod:"coredns-5d78c9869d-5fvxj", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.131/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliedb06ed26e7", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.182 [INFO][4376] k8s.go 578: Cleaning up netns ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.182 [INFO][4376] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" iface="eth0" netns="" Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.182 [INFO][4376] k8s.go 585: Releasing IP address(es) ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.182 [INFO][4376] utils.go 188: Calico CNI releasing IP address ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.216 [INFO][4382] ipam_plugin.go 415: Releasing address using handleID ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" HandleID="k8s-pod-network.b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.216 [INFO][4382] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.216 [INFO][4382] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.230 [WARNING][4382] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" HandleID="k8s-pod-network.b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.230 [INFO][4382] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" HandleID="k8s-pod-network.b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--5fvxj-eth0" Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.232 [INFO][4382] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:23.234594 env[1346]: 2024-02-12 19:18:23.233 [INFO][4376] k8s.go 591: Teardown processing complete. ContainerID="b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea" Feb 12 19:18:23.235393 env[1346]: time="2024-02-12T19:18:23.235337785Z" level=info msg="TearDown network for sandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\" successfully" Feb 12 19:18:23.246704 env[1346]: time="2024-02-12T19:18:23.246650521Z" level=info msg="RemovePodSandbox \"b2832e2c2ba15b5cb42e319519c997edc393bfea010f864d2f147acce039c1ea\" returns successfully" Feb 12 19:18:23.247448 env[1346]: time="2024-02-12T19:18:23.247420866Z" level=info msg="StopPodSandbox for \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\"" Feb 12 19:18:23.435147 systemd-networkd[1500]: cali9a94dc97ca9: Link UP Feb 12 19:18:23.452047 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:18:23.452179 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali9a94dc97ca9: link becomes ready Feb 12 19:18:23.452893 systemd-networkd[1500]: cali9a94dc97ca9: Gained carrier Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.302 [INFO][4399] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0 calico-apiserver-6bb88c845d- calico-apiserver 44831832-c85f-4ec4-928f-9e48d7125372 856 0 2024-02-12 19:18:22 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bb88c845d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-d216911d7c calico-apiserver-6bb88c845d-tp6tp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali9a94dc97ca9 [] []}} ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-tp6tp" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.302 [INFO][4399] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-tp6tp" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.365 [INFO][4435] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" HandleID="k8s-pod-network.5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.387 [INFO][4435] ipam_plugin.go 268: Auto assigning IP ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" HandleID="k8s-pod-network.5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400050f950), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-d216911d7c", "pod":"calico-apiserver-6bb88c845d-tp6tp", "timestamp":"2024-02-12 19:18:23.365642483 +0000 UTC"}, Hostname:"ci-3510.3.2-a-d216911d7c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.387 [INFO][4435] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.387 [INFO][4435] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.387 [INFO][4435] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-d216911d7c' Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.390 [INFO][4435] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.397 [INFO][4435] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.401 [INFO][4435] ipam.go 489: Trying affinity for 192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.403 [INFO][4435] ipam.go 155: Attempting to load block cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.405 [INFO][4435] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.405 [INFO][4435] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.128/26 handle="k8s-pod-network.5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.407 [INFO][4435] ipam.go 1682: Creating new handle: k8s-pod-network.5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946 Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.411 [INFO][4435] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.128/26 handle="k8s-pod-network.5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.427 [INFO][4435] ipam.go 1216: Successfully claimed IPs: [192.168.7.133/26] block=192.168.7.128/26 handle="k8s-pod-network.5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.427 [INFO][4435] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.133/26] handle="k8s-pod-network.5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.427 [INFO][4435] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:23.469384 env[1346]: 2024-02-12 19:18:23.427 [INFO][4435] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.133/26] IPv6=[] ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" HandleID="k8s-pod-network.5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" Feb 12 19:18:23.470510 env[1346]: 2024-02-12 19:18:23.430 [INFO][4399] k8s.go 385: Populated endpoint ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-tp6tp" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0", GenerateName:"calico-apiserver-6bb88c845d-", Namespace:"calico-apiserver", SelfLink:"", UID:"44831832-c85f-4ec4-928f-9e48d7125372", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 18, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb88c845d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"", Pod:"calico-apiserver-6bb88c845d-tp6tp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.7.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a94dc97ca9", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.470510 env[1346]: 2024-02-12 19:18:23.430 [INFO][4399] k8s.go 386: Calico CNI using IPs: [192.168.7.133/32] ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-tp6tp" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" Feb 12 19:18:23.470510 env[1346]: 2024-02-12 19:18:23.430 [INFO][4399] dataplane_linux.go 68: Setting the host side veth name to cali9a94dc97ca9 ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-tp6tp" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" Feb 12 19:18:23.470510 env[1346]: 2024-02-12 19:18:23.455 [INFO][4399] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-tp6tp" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" Feb 12 19:18:23.470510 env[1346]: 2024-02-12 19:18:23.455 [INFO][4399] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-tp6tp" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0", GenerateName:"calico-apiserver-6bb88c845d-", Namespace:"calico-apiserver", SelfLink:"", UID:"44831832-c85f-4ec4-928f-9e48d7125372", ResourceVersion:"856", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 18, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb88c845d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946", Pod:"calico-apiserver-6bb88c845d-tp6tp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.7.133/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali9a94dc97ca9", MAC:"c6:af:99:f9:6d:70", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.470510 env[1346]: 2024-02-12 19:18:23.466 [INFO][4399] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-tp6tp" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--tp6tp-eth0" Feb 12 19:18:23.493137 env[1346]: time="2024-02-12T19:18:23.492671206Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:23.493352 env[1346]: time="2024-02-12T19:18:23.493321993Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:23.493456 env[1346]: time="2024-02-12T19:18:23.493435711Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:23.493683 env[1346]: time="2024-02-12T19:18:23.493653587Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946 pid=4477 runtime=io.containerd.runc.v2 Feb 12 19:18:23.501066 systemd-networkd[1500]: cali831bf5264b8: Link UP Feb 12 19:18:23.522123 systemd-networkd[1500]: cali831bf5264b8: Gained carrier Feb 12 19:18:23.522924 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali831bf5264b8: link becomes ready Feb 12 19:18:23.530000 audit[4494]: NETFILTER_CFG table=filter:120 family=2 entries=65 op=nft_register_chain pid=4494 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:23.530000 audit[4494]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=32144 a0=3 a1=ffffd8e7b340 a2=0 a3=ffffad5f4fa8 items=0 ppid=3473 pid=4494 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.530000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.349 [WARNING][4429] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0", GenerateName:"calico-kube-controllers-c875bd866-", Namespace:"calico-system", SelfLink:"", UID:"fd97887b-ce3a-4e72-afd6-e0cefc89c552", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c875bd866", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce", Pod:"calico-kube-controllers-c875bd866-4pxqw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.7.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali22608793518", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.349 [INFO][4429] k8s.go 578: Cleaning up netns ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.349 [INFO][4429] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" iface="eth0" netns="" Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.349 [INFO][4429] k8s.go 585: Releasing IP address(es) ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.349 [INFO][4429] utils.go 188: Calico CNI releasing IP address ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.417 [INFO][4444] ipam_plugin.go 415: Releasing address using handleID ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" HandleID="k8s-pod-network.7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.417 [INFO][4444] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.483 [INFO][4444] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.521 [WARNING][4444] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" HandleID="k8s-pod-network.7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.521 [INFO][4444] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" HandleID="k8s-pod-network.7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.528 [INFO][4444] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:23.532947 env[1346]: 2024-02-12 19:18:23.529 [INFO][4429] k8s.go 591: Teardown processing complete. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:23.533480 env[1346]: time="2024-02-12T19:18:23.533415159Z" level=info msg="TearDown network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\" successfully" Feb 12 19:18:23.533655 env[1346]: time="2024-02-12T19:18:23.533615035Z" level=info msg="StopPodSandbox for \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\" returns successfully" Feb 12 19:18:23.534422 env[1346]: time="2024-02-12T19:18:23.534394980Z" level=info msg="RemovePodSandbox for \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\"" Feb 12 19:18:23.537244 env[1346]: time="2024-02-12T19:18:23.537190764Z" level=info msg="Forcibly stopping sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\"" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.301 [INFO][4388] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0 calico-apiserver-6bb88c845d- calico-apiserver e15af4a9-29e1-42e4-aca2-13eafb070f36 853 0 2024-02-12 19:18:22 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:6bb88c845d projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-d216911d7c calico-apiserver-6bb88c845d-q662m eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali831bf5264b8 [] []}} ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-q662m" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.301 [INFO][4388] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-q662m" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.375 [INFO][4434] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" HandleID="k8s-pod-network.7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.403 [INFO][4434] ipam_plugin.go 268: Auto assigning IP ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" HandleID="k8s-pod-network.7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400027b010), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-d216911d7c", "pod":"calico-apiserver-6bb88c845d-q662m", "timestamp":"2024-02-12 19:18:23.375478568 +0000 UTC"}, Hostname:"ci-3510.3.2-a-d216911d7c", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.405 [INFO][4434] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.427 [INFO][4434] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.427 [INFO][4434] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-d216911d7c' Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.430 [INFO][4434] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.438 [INFO][4434] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.447 [INFO][4434] ipam.go 489: Trying affinity for 192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.449 [INFO][4434] ipam.go 155: Attempting to load block cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.452 [INFO][4434] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.7.128/26 host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.453 [INFO][4434] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.7.128/26 handle="k8s-pod-network.7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.460 [INFO][4434] ipam.go 1682: Creating new handle: k8s-pod-network.7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063 Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.472 [INFO][4434] ipam.go 1203: Writing block in order to claim IPs block=192.168.7.128/26 handle="k8s-pod-network.7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.483 [INFO][4434] ipam.go 1216: Successfully claimed IPs: [192.168.7.134/26] block=192.168.7.128/26 handle="k8s-pod-network.7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.483 [INFO][4434] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.7.134/26] handle="k8s-pod-network.7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" host="ci-3510.3.2-a-d216911d7c" Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.483 [INFO][4434] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:23.546754 env[1346]: 2024-02-12 19:18:23.483 [INFO][4434] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.7.134/26] IPv6=[] ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" HandleID="k8s-pod-network.7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" Feb 12 19:18:23.547372 env[1346]: 2024-02-12 19:18:23.485 [INFO][4388] k8s.go 385: Populated endpoint ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-q662m" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0", GenerateName:"calico-apiserver-6bb88c845d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e15af4a9-29e1-42e4-aca2-13eafb070f36", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 18, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb88c845d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"", Pod:"calico-apiserver-6bb88c845d-q662m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.7.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali831bf5264b8", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.547372 env[1346]: 2024-02-12 19:18:23.485 [INFO][4388] k8s.go 386: Calico CNI using IPs: [192.168.7.134/32] ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-q662m" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" Feb 12 19:18:23.547372 env[1346]: 2024-02-12 19:18:23.485 [INFO][4388] dataplane_linux.go 68: Setting the host side veth name to cali831bf5264b8 ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-q662m" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" Feb 12 19:18:23.547372 env[1346]: 2024-02-12 19:18:23.529 [INFO][4388] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-q662m" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" Feb 12 19:18:23.547372 env[1346]: 2024-02-12 19:18:23.529 [INFO][4388] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-q662m" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0", GenerateName:"calico-apiserver-6bb88c845d-", Namespace:"calico-apiserver", SelfLink:"", UID:"e15af4a9-29e1-42e4-aca2-13eafb070f36", ResourceVersion:"853", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 18, 22, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"6bb88c845d", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063", Pod:"calico-apiserver-6bb88c845d-q662m", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.7.134/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali831bf5264b8", MAC:"26:68:4a:19:d8:dd", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.547372 env[1346]: 2024-02-12 19:18:23.545 [INFO][4388] k8s.go 491: Wrote updated endpoint to datastore ContainerID="7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063" Namespace="calico-apiserver" Pod="calico-apiserver-6bb88c845d-q662m" WorkloadEndpoint="ci--3510.3.2--a--d216911d7c-k8s-calico--apiserver--6bb88c845d--q662m-eth0" Feb 12 19:18:23.559524 systemd[1]: Started cri-containerd-5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946.scope. Feb 12 19:18:23.591423 env[1346]: time="2024-02-12T19:18:23.591341371Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:18:23.591423 env[1346]: time="2024-02-12T19:18:23.591390370Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:18:23.591599 env[1346]: time="2024-02-12T19:18:23.591400370Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:18:23.591599 env[1346]: time="2024-02-12T19:18:23.591520448Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063 pid=4546 runtime=io.containerd.runc.v2 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.600000 audit: BPF prog-id=186 op=LOAD Feb 12 19:18:23.601000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.601000 audit[4495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4477 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564336537343635653062393234373835333031613561343232386562 Feb 12 19:18:23.601000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.601000 audit[4495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4477 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.601000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564336537343635653062393234373835333031613561343232386562 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit: BPF prog-id=187 op=LOAD Feb 12 19:18:23.602000 audit[4495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4477 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564336537343635653062393234373835333031613561343232386562 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.602000 audit: BPF prog-id=188 op=LOAD Feb 12 19:18:23.602000 audit[4495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4477 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564336537343635653062393234373835333031613561343232386562 Feb 12 19:18:23.603000 audit: BPF prog-id=188 op=UNLOAD Feb 12 19:18:23.603000 audit: BPF prog-id=187 op=UNLOAD Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { perfmon } for pid=4495 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit[4495]: AVC avc: denied { bpf } for pid=4495 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.603000 audit: BPF prog-id=189 op=LOAD Feb 12 19:18:23.603000 audit[4495]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4477 pid=4495 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.603000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564336537343635653062393234373835333031613561343232386562 Feb 12 19:18:23.605000 audit[4543]: NETFILTER_CFG table=filter:121 family=2 entries=46 op=nft_register_chain pid=4543 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:18:23.605000 audit[4543]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=23292 a0=3 a1=ffffd15175f0 a2=0 a3=ffff88999fa8 items=0 ppid=3473 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.605000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:18:23.623141 systemd[1]: Started cri-containerd-7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063.scope. Feb 12 19:18:23.651023 env[1346]: time="2024-02-12T19:18:23.650972190Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb88c845d-tp6tp,Uid:44831832-c85f-4ec4-928f-9e48d7125372,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946\"" Feb 12 19:18:23.653152 env[1346]: time="2024-02-12T19:18:23.653119547Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.664000 audit: BPF prog-id=190 op=LOAD Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4546 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643131633065633134643061313632316565393136393233323265 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4546 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643131633065633134643061313632316565393136393233323265 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.665000 audit: BPF prog-id=191 op=LOAD Feb 12 19:18:23.665000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4546 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.665000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643131633065633134643061313632316565393136393233323265 Feb 12 19:18:23.666000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.666000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.666000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.666000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.666000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.666000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.666000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.666000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.666000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.666000 audit: BPF prog-id=192 op=LOAD Feb 12 19:18:23.666000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4546 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.666000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643131633065633134643061313632316565393136393233323265 Feb 12 19:18:23.667000 audit: BPF prog-id=192 op=UNLOAD Feb 12 19:18:23.667000 audit: BPF prog-id=191 op=UNLOAD Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { perfmon } for pid=4557 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit[4557]: AVC avc: denied { bpf } for pid=4557 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:23.667000 audit: BPF prog-id=193 op=LOAD Feb 12 19:18:23.667000 audit[4557]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4546 pid=4557 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:23.667000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3763643131633065633134643061313632316565393136393233323265 Feb 12 19:18:23.696261 env[1346]: time="2024-02-12T19:18:23.696156614Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-6bb88c845d-q662m,Uid:e15af4a9-29e1-42e4-aca2-13eafb070f36,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063\"" Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.651 [WARNING][4530] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0", GenerateName:"calico-kube-controllers-c875bd866-", Namespace:"calico-system", SelfLink:"", UID:"fd97887b-ce3a-4e72-afd6-e0cefc89c552", ResourceVersion:"775", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"c875bd866", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"2d0cfe05fca9a32b79b1dfe7dc3b6b44bde52c570cc0a58097a291dcb229b9ce", Pod:"calico-kube-controllers-c875bd866-4pxqw", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.7.129/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali22608793518", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.652 [INFO][4530] k8s.go 578: Cleaning up netns ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.652 [INFO][4530] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" iface="eth0" netns="" Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.652 [INFO][4530] k8s.go 585: Releasing IP address(es) ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.652 [INFO][4530] utils.go 188: Calico CNI releasing IP address ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.685 [INFO][4581] ipam_plugin.go 415: Releasing address using handleID ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" HandleID="k8s-pod-network.7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.685 [INFO][4581] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.685 [INFO][4581] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.700 [WARNING][4581] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" HandleID="k8s-pod-network.7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.700 [INFO][4581] ipam_plugin.go 443: Releasing address using workloadID ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" HandleID="k8s-pod-network.7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Workload="ci--3510.3.2--a--d216911d7c-k8s-calico--kube--controllers--c875bd866--4pxqw-eth0" Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.704 [INFO][4581] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:23.707447 env[1346]: 2024-02-12 19:18:23.706 [INFO][4530] k8s.go 591: Teardown processing complete. ContainerID="7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a" Feb 12 19:18:23.708025 env[1346]: time="2024-02-12T19:18:23.707985860Z" level=info msg="TearDown network for sandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\" successfully" Feb 12 19:18:23.717487 env[1346]: time="2024-02-12T19:18:23.717441113Z" level=info msg="RemovePodSandbox \"7abd880aaef61042266993237a6eaacae66f2fa9236c883a83dec84cea0b6e6a\" returns successfully" Feb 12 19:18:23.718288 env[1346]: time="2024-02-12T19:18:23.718254656Z" level=info msg="StopPodSandbox for \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\"" Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.754 [WARNING][4605] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"2b4537c7-703c-4fb7-865e-ca2b24bf23c8", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3", Pod:"coredns-5d78c9869d-8cd7j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9adc184b09e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.755 [INFO][4605] k8s.go 578: Cleaning up netns ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.755 [INFO][4605] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" iface="eth0" netns="" Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.755 [INFO][4605] k8s.go 585: Releasing IP address(es) ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.755 [INFO][4605] utils.go 188: Calico CNI releasing IP address ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.774 [INFO][4611] ipam_plugin.go 415: Releasing address using handleID ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" HandleID="k8s-pod-network.91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.774 [INFO][4611] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.774 [INFO][4611] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.783 [WARNING][4611] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" HandleID="k8s-pod-network.91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.784 [INFO][4611] ipam_plugin.go 443: Releasing address using workloadID ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" HandleID="k8s-pod-network.91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.785 [INFO][4611] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:23.788437 env[1346]: 2024-02-12 19:18:23.787 [INFO][4605] k8s.go 591: Teardown processing complete. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:23.789005 env[1346]: time="2024-02-12T19:18:23.788465025Z" level=info msg="TearDown network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\" successfully" Feb 12 19:18:23.789005 env[1346]: time="2024-02-12T19:18:23.788497105Z" level=info msg="StopPodSandbox for \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\" returns successfully" Feb 12 19:18:23.789331 env[1346]: time="2024-02-12T19:18:23.789281489Z" level=info msg="RemovePodSandbox for \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\"" Feb 12 19:18:23.789465 env[1346]: time="2024-02-12T19:18:23.789423726Z" level=info msg="Forcibly stopping sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\"" Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.826 [WARNING][4629] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0", GenerateName:"coredns-5d78c9869d-", Namespace:"kube-system", SelfLink:"", UID:"2b4537c7-703c-4fb7-865e-ca2b24bf23c8", ResourceVersion:"770", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5d78c9869d", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"ec4b211aef235fd72b0108e98f03ef50edc42c2940c21567ded68857693963c3", Pod:"coredns-5d78c9869d-8cd7j", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.7.132/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali9adc184b09e", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.826 [INFO][4629] k8s.go 578: Cleaning up netns ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.826 [INFO][4629] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" iface="eth0" netns="" Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.826 [INFO][4629] k8s.go 585: Releasing IP address(es) ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.826 [INFO][4629] utils.go 188: Calico CNI releasing IP address ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.844 [INFO][4635] ipam_plugin.go 415: Releasing address using handleID ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" HandleID="k8s-pod-network.91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.844 [INFO][4635] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.844 [INFO][4635] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.854 [WARNING][4635] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" HandleID="k8s-pod-network.91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.854 [INFO][4635] ipam_plugin.go 443: Releasing address using workloadID ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" HandleID="k8s-pod-network.91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Workload="ci--3510.3.2--a--d216911d7c-k8s-coredns--5d78c9869d--8cd7j-eth0" Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.856 [INFO][4635] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:23.859246 env[1346]: 2024-02-12 19:18:23.858 [INFO][4629] k8s.go 591: Teardown processing complete. ContainerID="91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c" Feb 12 19:18:23.859681 env[1346]: time="2024-02-12T19:18:23.859283942Z" level=info msg="TearDown network for sandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\" successfully" Feb 12 19:18:23.876574 env[1346]: time="2024-02-12T19:18:23.876521280Z" level=info msg="RemovePodSandbox \"91088dff10492cd86adbc550731b2877544eec3e46bce7ee216c782a765e989c\" returns successfully" Feb 12 19:18:23.877227 env[1346]: time="2024-02-12T19:18:23.877093269Z" level=info msg="StopPodSandbox for \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\"" Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.913 [WARNING][4654] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b", Pod:"csi-node-driver-d8zcl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.7.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali59f0807b11b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.913 [INFO][4654] k8s.go 578: Cleaning up netns ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.913 [INFO][4654] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" iface="eth0" netns="" Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.913 [INFO][4654] k8s.go 585: Releasing IP address(es) ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.913 [INFO][4654] utils.go 188: Calico CNI releasing IP address ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.947 [INFO][4660] ipam_plugin.go 415: Releasing address using handleID ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" HandleID="k8s-pod-network.e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.947 [INFO][4660] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.947 [INFO][4660] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.957 [WARNING][4660] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" HandleID="k8s-pod-network.e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.957 [INFO][4660] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" HandleID="k8s-pod-network.e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.958 [INFO][4660] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:23.966317 env[1346]: 2024-02-12 19:18:23.960 [INFO][4654] k8s.go 591: Teardown processing complete. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:23.967869 env[1346]: time="2024-02-12T19:18:23.967828911Z" level=info msg="TearDown network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\" successfully" Feb 12 19:18:23.974277 env[1346]: time="2024-02-12T19:18:23.967926309Z" level=info msg="StopPodSandbox for \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\" returns successfully" Feb 12 19:18:23.974277 env[1346]: time="2024-02-12T19:18:23.968444259Z" level=info msg="RemovePodSandbox for \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\"" Feb 12 19:18:23.974277 env[1346]: time="2024-02-12T19:18:23.968473938Z" level=info msg="Forcibly stopping sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\"" Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.006 [WARNING][4678] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"09c9c1ad-87e3-401b-bf4d-ed8fcb85c00b", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 17, 43, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"86b88cf7c9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-d216911d7c", ContainerID:"5114d39628c7dfb455199c64084345945de991646c21a61509b01852b67ba70b", Pod:"csi-node-driver-d8zcl", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.7.130/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"cali59f0807b11b", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.007 [INFO][4678] k8s.go 578: Cleaning up netns ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.007 [INFO][4678] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" iface="eth0" netns="" Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.007 [INFO][4678] k8s.go 585: Releasing IP address(es) ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.007 [INFO][4678] utils.go 188: Calico CNI releasing IP address ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.028 [INFO][4684] ipam_plugin.go 415: Releasing address using handleID ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" HandleID="k8s-pod-network.e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.028 [INFO][4684] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.028 [INFO][4684] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.037 [WARNING][4684] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" HandleID="k8s-pod-network.e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.037 [INFO][4684] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" HandleID="k8s-pod-network.e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Workload="ci--3510.3.2--a--d216911d7c-k8s-csi--node--driver--d8zcl-eth0" Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.039 [INFO][4684] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:18:24.041900 env[1346]: 2024-02-12 19:18:24.040 [INFO][4678] k8s.go 591: Teardown processing complete. ContainerID="e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99" Feb 12 19:18:24.042713 env[1346]: time="2024-02-12T19:18:24.042671436Z" level=info msg="TearDown network for sandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\" successfully" Feb 12 19:18:24.052259 env[1346]: time="2024-02-12T19:18:24.052209649Z" level=info msg="RemovePodSandbox \"e5456d5b2ddce08ebda337a0bd455134549316235863f95fbbdadd2e2aea8f99\" returns successfully" Feb 12 19:18:24.368119 systemd[1]: run-containerd-runc-k8s.io-7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063-runc.r4NhAb.mount: Deactivated successfully. Feb 12 19:18:24.816854 systemd-networkd[1500]: cali9a94dc97ca9: Gained IPv6LL Feb 12 19:18:25.072957 systemd-networkd[1500]: cali831bf5264b8: Gained IPv6LL Feb 12 19:18:26.080107 env[1346]: time="2024-02-12T19:18:26.080047481Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:26.092923 env[1346]: time="2024-02-12T19:18:26.092862194Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:26.098405 env[1346]: time="2024-02-12T19:18:26.098357808Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:26.103371 env[1346]: time="2024-02-12T19:18:26.103323633Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:26.104051 env[1346]: time="2024-02-12T19:18:26.104019499Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 19:18:26.106684 env[1346]: time="2024-02-12T19:18:26.105510950Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:18:26.108102 env[1346]: time="2024-02-12T19:18:26.108059021Z" level=info msg="CreateContainer within sandbox \"5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:18:26.138553 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1492996069.mount: Deactivated successfully. Feb 12 19:18:26.163532 systemd[1]: run-containerd-runc-k8s.io-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647-runc.B3VgDH.mount: Deactivated successfully. Feb 12 19:18:26.168860 env[1346]: time="2024-02-12T19:18:26.167003805Z" level=info msg="CreateContainer within sandbox \"5d3e7465e0b924785301a5a4228eb6ca0a41be28619d2b4eb019c7dabb4f0946\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8\"" Feb 12 19:18:26.169343 env[1346]: time="2024-02-12T19:18:26.169310800Z" level=info msg="StartContainer for \"2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8\"" Feb 12 19:18:26.190625 systemd[1]: Started cri-containerd-2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8.scope. Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.208000 audit: BPF prog-id=194 op=LOAD Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4477 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346530626362396665363462643537336435346563373136326236 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4477 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346530626362396665363462643537336435346563373136326236 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit: BPF prog-id=195 op=LOAD Feb 12 19:18:26.209000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4477 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346530626362396665363462643537336435346563373136326236 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit: BPF prog-id=196 op=LOAD Feb 12 19:18:26.209000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4477 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346530626362396665363462643537336435346563373136326236 Feb 12 19:18:26.209000 audit: BPF prog-id=196 op=UNLOAD Feb 12 19:18:26.209000 audit: BPF prog-id=195 op=UNLOAD Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { perfmon } for pid=4716 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit[4716]: AVC avc: denied { bpf } for pid=4716 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.209000 audit: BPF prog-id=197 op=LOAD Feb 12 19:18:26.209000 audit[4716]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4477 pid=4716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.209000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3262346530626362396665363462643537336435346563373136326236 Feb 12 19:18:26.253804 env[1346]: time="2024-02-12T19:18:26.253682213Z" level=info msg="StartContainer for \"2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8\" returns successfully" Feb 12 19:18:26.310445 kubelet[2463]: I0212 19:18:26.310410 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bb88c845d-tp6tp" podStartSLOduration=1.858818061 podCreationTimestamp="2024-02-12 19:18:22 +0000 UTC" firstStartedPulling="2024-02-12 19:18:23.652829913 +0000 UTC m=+60.756018920" lastFinishedPulling="2024-02-12 19:18:26.104383732 +0000 UTC m=+63.207572779" observedRunningTime="2024-02-12 19:18:26.308634393 +0000 UTC m=+63.411823400" watchObservedRunningTime="2024-02-12 19:18:26.31037192 +0000 UTC m=+63.413560887" Feb 12 19:18:26.339000 audit[4760]: NETFILTER_CFG table=filter:122 family=2 entries=10 op=nft_register_rule pid=4760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:26.339000 audit[4760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffedcb6cb0 a2=0 a3=ffffba77f6c0 items=0 ppid=2641 pid=4760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.339000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:26.341000 audit[4760]: NETFILTER_CFG table=nat:123 family=2 entries=20 op=nft_register_rule pid=4760 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:26.341000 audit[4760]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffedcb6cb0 a2=0 a3=ffffba77f6c0 items=0 ppid=2641 pid=4760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.341000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:26.472035 env[1346]: time="2024-02-12T19:18:26.471954524Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:26.479138 env[1346]: time="2024-02-12T19:18:26.479097786Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:26.483951 env[1346]: time="2024-02-12T19:18:26.483912933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:26.489092 env[1346]: time="2024-02-12T19:18:26.489045714Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:18:26.489680 env[1346]: time="2024-02-12T19:18:26.489643103Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 19:18:26.491996 env[1346]: time="2024-02-12T19:18:26.491958178Z" level=info msg="CreateContainer within sandbox \"7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:18:26.534626 env[1346]: time="2024-02-12T19:18:26.534565396Z" level=info msg="CreateContainer within sandbox \"7cd11c0ec14d0a1621ee91692322ee62c8b007203310f5e08886bb8dedb5f063\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e\"" Feb 12 19:18:26.535647 env[1346]: time="2024-02-12T19:18:26.535609016Z" level=info msg="StartContainer for \"064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e\"" Feb 12 19:18:26.552669 systemd[1]: Started cri-containerd-064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e.scope. Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit: BPF prog-id=198 op=LOAD Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4546 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346236383137363166306332383263316463663365316163643134 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4546 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346236383137363166306332383263316463663365316163643134 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit: BPF prog-id=199 op=LOAD Feb 12 19:18:26.568000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4546 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346236383137363166306332383263316463663365316163643134 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit: BPF prog-id=200 op=LOAD Feb 12 19:18:26.568000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4546 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346236383137363166306332383263316463663365316163643134 Feb 12 19:18:26.568000 audit: BPF prog-id=200 op=UNLOAD Feb 12 19:18:26.568000 audit: BPF prog-id=199 op=UNLOAD Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { perfmon } for pid=4769 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit[4769]: AVC avc: denied { bpf } for pid=4769 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:18:26.568000 audit: BPF prog-id=201 op=LOAD Feb 12 19:18:26.568000 audit[4769]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4546 pid=4769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:26.568000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3036346236383137363166306332383263316463663365316163643134 Feb 12 19:18:26.599916 env[1346]: time="2024-02-12T19:18:26.599802298Z" level=info msg="StartContainer for \"064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e\" returns successfully" Feb 12 19:18:27.311531 kubelet[2463]: I0212 19:18:27.311491 2463 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-6bb88c845d-q662m" podStartSLOduration=2.522607605 podCreationTimestamp="2024-02-12 19:18:22 +0000 UTC" firstStartedPulling="2024-02-12 19:18:23.701555787 +0000 UTC m=+60.804744794" lastFinishedPulling="2024-02-12 19:18:26.490401728 +0000 UTC m=+63.593590735" observedRunningTime="2024-02-12 19:18:27.310134531 +0000 UTC m=+64.413323538" watchObservedRunningTime="2024-02-12 19:18:27.311453546 +0000 UTC m=+64.414642553" Feb 12 19:18:27.328000 audit[4802]: NETFILTER_CFG table=filter:124 family=2 entries=10 op=nft_register_rule pid=4802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:27.334555 kernel: kauditd_printk_skb: 242 callbacks suppressed Feb 12 19:18:27.334683 kernel: audit: type=1325 audit(1707765507.328:1415): table=filter:124 family=2 entries=10 op=nft_register_rule pid=4802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:27.334000 audit[4733]: AVC avc: denied { watch } for pid=4733 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.317804862/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c786 tclass=file permissive=0 Feb 12 19:18:27.380438 kernel: audit: type=1400 audit(1707765507.334:1416): avc: denied { watch } for pid=4733 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.317804862/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c786 tclass=file permissive=0 Feb 12 19:18:27.334000 audit[4733]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000baf0e0 a2=fc6 a3=0 items=0 ppid=4477 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 key=(null) Feb 12 19:18:27.413664 kernel: audit: type=1300 audit(1707765507.334:1416): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000baf0e0 a2=fc6 a3=0 items=0 ppid=4477 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 key=(null) Feb 12 19:18:27.334000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:18:27.328000 audit[4802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc45f2a60 a2=0 a3=ffffaefd16c0 items=0 ppid=2641 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:27.451748 kernel: audit: type=1327 audit(1707765507.334:1416): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:18:27.486754 kernel: audit: type=1300 audit(1707765507.328:1415): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc45f2a60 a2=0 a3=ffffaefd16c0 items=0 ppid=2641 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:27.328000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:27.503829 kernel: audit: type=1327 audit(1707765507.328:1415): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:27.351000 audit[4802]: NETFILTER_CFG table=nat:125 family=2 entries=20 op=nft_register_rule pid=4802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:27.351000 audit[4802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc45f2a60 a2=0 a3=ffffaefd16c0 items=0 ppid=2641 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:27.558809 kernel: audit: type=1325 audit(1707765507.351:1417): table=nat:125 family=2 entries=20 op=nft_register_rule pid=4802 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:27.558925 kernel: audit: type=1300 audit(1707765507.351:1417): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc45f2a60 a2=0 a3=ffffaefd16c0 items=0 ppid=2641 pid=4802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:27.351000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:27.575807 kernel: audit: type=1327 audit(1707765507.351:1417): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:27.676000 audit[4780]: AVC avc: denied { watch } for pid=4780 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.1103776437/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c509,c551 tclass=file permissive=0 Feb 12 19:18:27.708824 kernel: audit: type=1400 audit(1707765507.676:1418): avc: denied { watch } for pid=4780 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.1103776437/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c509,c551 tclass=file permissive=0 Feb 12 19:18:27.676000 audit[4780]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a99500 a2=fc6 a3=0 items=0 ppid=4546 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 key=(null) Feb 12 19:18:27.676000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:18:33.706000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:33.712290 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:18:33.712432 kernel: audit: type=1400 audit(1707765513.706:1419): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:33.706000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010d5460 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:18:33.771758 kernel: audit: type=1300 audit(1707765513.706:1419): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010d5460 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:18:33.706000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:33.801406 kernel: audit: type=1327 audit(1707765513.706:1419): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:33.801525 kernel: audit: type=1400 audit(1707765513.711:1420): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:33.711000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:33.711000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400127a7c0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:18:33.857709 kernel: audit: type=1300 audit(1707765513.711:1420): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400127a7c0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:18:33.711000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:33.884487 kernel: audit: type=1327 audit(1707765513.711:1420): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:33.884671 kernel: audit: type=1400 audit(1707765513.714:1421): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:33.714000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:33.714000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400127a8e0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:18:33.940940 kernel: audit: type=1300 audit(1707765513.714:1421): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400127a8e0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:18:33.714000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:33.968176 kernel: audit: type=1327 audit(1707765513.714:1421): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:33.968321 kernel: audit: type=1400 audit(1707765513.714:1422): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:33.714000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:18:33.714000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400127b240 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:18:33.714000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:18:48.479843 systemd[1]: run-containerd-runc-k8s.io-baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c-runc.BuAivk.mount: Deactivated successfully. Feb 12 19:18:49.473953 systemd[1]: run-containerd-runc-k8s.io-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647-runc.NEFYSB.mount: Deactivated successfully. Feb 12 19:18:53.153590 systemd[1]: run-containerd-runc-k8s.io-064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e-runc.AamM0Q.mount: Deactivated successfully. Feb 12 19:18:53.226000 audit[4905]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:53.233755 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:18:53.233858 kernel: audit: type=1325 audit(1707765533.226:1423): table=filter:126 family=2 entries=9 op=nft_register_rule pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:53.226000 audit[4905]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc3629150 a2=0 a3=ffffa0bc16c0 items=0 ppid=2641 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:53.226000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:53.311014 kernel: audit: type=1300 audit(1707765533.226:1423): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc3629150 a2=0 a3=ffffa0bc16c0 items=0 ppid=2641 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:53.311112 kernel: audit: type=1327 audit(1707765533.226:1423): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:53.231000 audit[4905]: NETFILTER_CFG table=nat:127 family=2 entries=27 op=nft_register_chain pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:53.328131 kernel: audit: type=1325 audit(1707765533.231:1424): table=nat:127 family=2 entries=27 op=nft_register_chain pid=4905 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:53.231000 audit[4905]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=ffffc3629150 a2=0 a3=ffffa0bc16c0 items=0 ppid=2641 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:53.362278 kernel: audit: type=1300 audit(1707765533.231:1424): arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=ffffc3629150 a2=0 a3=ffffa0bc16c0 items=0 ppid=2641 pid=4905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:53.231000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:53.327000 audit[4907]: NETFILTER_CFG table=filter:128 family=2 entries=8 op=nft_register_rule pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:53.398771 kernel: audit: type=1327 audit(1707765533.231:1424): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:53.398869 kernel: audit: type=1325 audit(1707765533.327:1425): table=filter:128 family=2 entries=8 op=nft_register_rule pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:53.327000 audit[4907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd0c32580 a2=0 a3=ffffa43b16c0 items=0 ppid=2641 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:53.433132 kernel: audit: type=1300 audit(1707765533.327:1425): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd0c32580 a2=0 a3=ffffa43b16c0 items=0 ppid=2641 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:53.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:53.450586 kernel: audit: type=1327 audit(1707765533.327:1425): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:53.363000 audit[4907]: NETFILTER_CFG table=nat:129 family=2 entries=34 op=nft_register_chain pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:53.468127 kernel: audit: type=1325 audit(1707765533.363:1426): table=nat:129 family=2 entries=34 op=nft_register_chain pid=4907 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:18:53.363000 audit[4907]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10868 a0=3 a1=ffffd0c32580 a2=0 a3=ffffa43b16c0 items=0 ppid=2641 pid=4907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:18:53.363000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:18:54.147005 systemd[1]: run-containerd-runc-k8s.io-2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8-runc.rLWeCD.mount: Deactivated successfully. Feb 12 19:18:56.163518 systemd[1]: run-containerd-runc-k8s.io-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647-runc.8y5cUK.mount: Deactivated successfully. Feb 12 19:19:18.479598 systemd[1]: run-containerd-runc-k8s.io-baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c-runc.Th4h9o.mount: Deactivated successfully. Feb 12 19:19:18.964000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:18.971138 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:19:18.971273 kernel: audit: type=1400 audit(1707765558.964:1428): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:18.964000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:19.024286 kernel: audit: type=1400 audit(1707765558.964:1427): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:18.964000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40000cb3c0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:19.062925 kernel: audit: type=1300 audit(1707765558.964:1427): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40000cb3c0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:18.964000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013d9ef0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:19.101217 kernel: audit: type=1300 audit(1707765558.964:1428): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013d9ef0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:19.101369 kernel: audit: type=1327 audit(1707765558.964:1427): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:18.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:18.964000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:19.163107 kernel: audit: type=1327 audit(1707765558.964:1428): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:19.163334 kernel: audit: type=1400 audit(1707765559.142:1429): avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:19.142000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:19.190860 kernel: audit: type=1300 audit(1707765559.142:1429): arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4000ce3290 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:19:19.142000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4000ce3290 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:19:19.142000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:19.255866 kernel: audit: type=1327 audit(1707765559.142:1429): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:19.256022 kernel: audit: type=1400 audit(1707765559.143:1430): avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:19.143000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:19.143000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40124f7500 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:19:19.143000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:19.181000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:19.181000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4006853420 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:19:19.181000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:19.182000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:19.182000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4000ce3bc0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:19:19.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:19.184000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:19.184000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=4000ce3c20 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:19:19.184000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:19.184000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:19.184000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6c a1=40153b53c0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:19:19.184000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:19:23.150390 systemd[1]: run-containerd-runc-k8s.io-064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e-runc.e5863M.mount: Deactivated successfully. Feb 12 19:19:24.144329 systemd[1]: run-containerd-runc-k8s.io-2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8-runc.laTXsO.mount: Deactivated successfully. Feb 12 19:19:26.164917 systemd[1]: run-containerd-runc-k8s.io-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647-runc.o25B0N.mount: Deactivated successfully. Feb 12 19:19:27.337000 audit[4733]: AVC avc: denied { watch } for pid=4733 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.317804862/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c786 tclass=file permissive=0 Feb 12 19:19:27.344376 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 19:19:27.344495 kernel: audit: type=1400 audit(1707765567.337:1435): avc: denied { watch } for pid=4733 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.317804862/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c786 tclass=file permissive=0 Feb 12 19:19:27.375762 kernel: audit: type=1300 audit(1707765567.337:1435): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001984dc0 a2=fc6 a3=0 items=0 ppid=4477 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 key=(null) Feb 12 19:19:27.337000 audit[4733]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001984dc0 a2=fc6 a3=0 items=0 ppid=4477 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 key=(null) Feb 12 19:19:27.337000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:19:27.436327 kernel: audit: type=1327 audit(1707765567.337:1435): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:19:27.702000 audit[4780]: AVC avc: denied { watch } for pid=4780 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.1103776437/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c509,c551 tclass=file permissive=0 Feb 12 19:19:27.702000 audit[4780]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000efc1e0 a2=fc6 a3=0 items=0 ppid=4546 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 key=(null) Feb 12 19:19:27.734841 kernel: audit: type=1400 audit(1707765567.702:1436): avc: denied { watch } for pid=4780 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.1103776437/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c509,c551 tclass=file permissive=0 Feb 12 19:19:27.702000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:19:27.799031 kernel: audit: type=1300 audit(1707765567.702:1436): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4000efc1e0 a2=fc6 a3=0 items=0 ppid=4546 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 key=(null) Feb 12 19:19:27.799161 kernel: audit: type=1327 audit(1707765567.702:1436): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:19:33.706000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:33.706000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a3bd60 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:33.770495 kernel: audit: type=1400 audit(1707765573.706:1437): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:33.770629 kernel: audit: type=1300 audit(1707765573.706:1437): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a3bd60 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:33.706000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:33.800851 kernel: audit: type=1327 audit(1707765573.706:1437): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:33.712000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:33.828109 kernel: audit: type=1400 audit(1707765573.712:1438): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:33.712000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a3be80 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:33.863261 kernel: audit: type=1300 audit(1707765573.712:1438): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a3be80 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:33.712000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:33.892382 kernel: audit: type=1327 audit(1707765573.712:1438): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:33.714000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:33.918510 kernel: audit: type=1400 audit(1707765573.714:1439): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:33.714000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002adf5e0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:33.954545 kernel: audit: type=1300 audit(1707765573.714:1439): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002adf5e0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:33.954746 kernel: audit: type=1327 audit(1707765573.714:1439): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:33.714000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:33.714000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:34.008758 kernel: audit: type=1400 audit(1707765573.714:1440): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:19:33.714000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a3bfa0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:19:33.714000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:19:48.481163 systemd[1]: run-containerd-runc-k8s.io-baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c-runc.bzsEDH.mount: Deactivated successfully. Feb 12 19:19:49.473519 systemd[1]: run-containerd-runc-k8s.io-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647-runc.qYD9sj.mount: Deactivated successfully. Feb 12 19:19:53.151257 systemd[1]: run-containerd-runc-k8s.io-064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e-runc.z1hp5D.mount: Deactivated successfully. Feb 12 19:19:54.144992 systemd[1]: run-containerd-runc-k8s.io-2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8-runc.IriqaZ.mount: Deactivated successfully. Feb 12 19:19:56.165244 systemd[1]: run-containerd-runc-k8s.io-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647-runc.W1hHpu.mount: Deactivated successfully. Feb 12 19:20:18.478185 systemd[1]: run-containerd-runc-k8s.io-baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c-runc.9onTiz.mount: Deactivated successfully. Feb 12 19:20:18.965000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:18.972004 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:20:18.972132 kernel: audit: type=1400 audit(1707765618.965:1441): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:18.965000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dd9000 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:20:19.030696 kernel: audit: type=1300 audit(1707765618.965:1441): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000dd9000 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:20:18.965000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:19.058212 kernel: audit: type=1327 audit(1707765618.965:1441): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:18.995000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:18.995000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d5e600 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:20:19.120087 kernel: audit: type=1400 audit(1707765618.995:1442): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:19.120197 kernel: audit: type=1300 audit(1707765618.995:1442): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d5e600 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:20:18.995000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:19.147655 kernel: audit: type=1327 audit(1707765618.995:1442): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:19.139000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:19.173077 kernel: audit: type=1400 audit(1707765619.139:1443): avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:19.139000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=40082fa690 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:20:19.206618 kernel: audit: type=1300 audit(1707765619.139:1443): arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=40082fa690 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:20:19.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:19.234856 kernel: audit: type=1327 audit(1707765619.139:1443): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:19.139000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:19.260767 kernel: audit: type=1400 audit(1707765619.139:1444): avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:19.139000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=40085d0270 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:20:19.139000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:19.177000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:19.177000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=63 a1=400df89840 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:20:19.177000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:19.182000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:19.182000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=63 a1=40085d03c0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:20:19.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:19.182000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:19.182000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=63 a1=40083c0060 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:20:19.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:19.182000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:19.182000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=63 a1=400df898e0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:20:19.182000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:20:21.198000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.38:22-10.200.12.6:57990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:21.199968 systemd[1]: Started sshd@7-10.200.20.38:22-10.200.12.6:57990.service. Feb 12 19:20:21.651000 audit[5178]: USER_ACCT pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:21.653566 sshd[5178]: Accepted publickey for core from 10.200.12.6 port 57990 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:21.652000 audit[5178]: CRED_ACQ pid=5178 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:21.652000 audit[5178]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd57e21b0 a2=3 a3=1 items=0 ppid=1 pid=5178 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:21.652000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:21.654922 sshd[5178]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:21.659078 systemd-logind[1334]: New session 10 of user core. Feb 12 19:20:21.659543 systemd[1]: Started session-10.scope. Feb 12 19:20:21.662000 audit[5178]: USER_START pid=5178 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:21.663000 audit[5180]: CRED_ACQ pid=5180 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:22.055182 sshd[5178]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:22.054000 audit[5178]: USER_END pid=5178 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:22.054000 audit[5178]: CRED_DISP pid=5178 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:22.057839 systemd-logind[1334]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:20:22.058005 systemd[1]: sshd@7-10.200.20.38:22-10.200.12.6:57990.service: Deactivated successfully. Feb 12 19:20:22.056000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.38:22-10.200.12.6:57990 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:22.058835 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:20:22.059530 systemd-logind[1334]: Removed session 10. Feb 12 19:20:23.156272 systemd[1]: run-containerd-runc-k8s.io-064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e-runc.P0oi75.mount: Deactivated successfully. Feb 12 19:20:24.150330 systemd[1]: run-containerd-runc-k8s.io-2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8-runc.qnxNSI.mount: Deactivated successfully. Feb 12 19:20:26.163751 systemd[1]: run-containerd-runc-k8s.io-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647-runc.Vf0Hd5.mount: Deactivated successfully. Feb 12 19:20:27.126407 systemd[1]: Started sshd@8-10.200.20.38:22-10.200.12.6:56552.service. Feb 12 19:20:27.156662 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 19:20:27.156801 kernel: audit: type=1130 audit(1707765627.125:1458): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.38:22-10.200.12.6:56552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:27.125000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.38:22-10.200.12.6:56552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:27.338000 audit[4733]: AVC avc: denied { watch } for pid=4733 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.317804862/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c786 tclass=file permissive=0 Feb 12 19:20:27.338000 audit[4733]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40019e0ce0 a2=fc6 a3=0 items=0 ppid=4477 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 key=(null) Feb 12 19:20:27.398716 kernel: audit: type=1400 audit(1707765627.338:1459): avc: denied { watch } for pid=4733 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.317804862/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c786 tclass=file permissive=0 Feb 12 19:20:27.398858 kernel: audit: type=1300 audit(1707765627.338:1459): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40019e0ce0 a2=fc6 a3=0 items=0 ppid=4477 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 key=(null) Feb 12 19:20:27.338000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:20:27.426215 kernel: audit: type=1327 audit(1707765627.338:1459): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:20:27.575000 audit[5252]: USER_ACCT pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:27.575987 sshd[5252]: Accepted publickey for core from 10.200.12.6 port 56552 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:27.577683 sshd[5252]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:27.576000 audit[5252]: CRED_ACQ pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:27.628948 kernel: audit: type=1101 audit(1707765627.575:1460): pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:27.629086 kernel: audit: type=1103 audit(1707765627.576:1461): pid=5252 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:27.645510 kernel: audit: type=1006 audit(1707765627.576:1462): pid=5252 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 19:20:27.576000 audit[5252]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc5e0700 a2=3 a3=1 items=0 ppid=1 pid=5252 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:27.672463 kernel: audit: type=1300 audit(1707765627.576:1462): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdc5e0700 a2=3 a3=1 items=0 ppid=1 pid=5252 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:27.576000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:27.682302 kernel: audit: type=1327 audit(1707765627.576:1462): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:27.684290 systemd-logind[1334]: New session 11 of user core. Feb 12 19:20:27.684781 systemd[1]: Started session-11.scope. Feb 12 19:20:27.688000 audit[5252]: USER_START pid=5252 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:27.718000 audit[4780]: AVC avc: denied { watch } for pid=4780 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.1103776437/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c509,c551 tclass=file permissive=0 Feb 12 19:20:27.718000 audit[4780]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001ceef00 a2=fc6 a3=0 items=0 ppid=4546 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 key=(null) Feb 12 19:20:27.718000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:20:27.721490 kernel: audit: type=1105 audit(1707765627.688:1463): pid=5252 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:27.720000 audit[5254]: CRED_ACQ pid=5254 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:28.028217 sshd[5252]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:28.029000 audit[5252]: USER_END pid=5252 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:28.029000 audit[5252]: CRED_DISP pid=5252 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:28.031677 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:20:28.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.38:22-10.200.12.6:56552 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:28.032484 systemd-logind[1334]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:20:28.032644 systemd[1]: sshd@8-10.200.20.38:22-10.200.12.6:56552.service: Deactivated successfully. Feb 12 19:20:28.033946 systemd-logind[1334]: Removed session 11. Feb 12 19:20:33.104246 systemd[1]: Started sshd@9-10.200.20.38:22-10.200.12.6:56558.service. Feb 12 19:20:33.137032 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:20:33.137136 kernel: audit: type=1130 audit(1707765633.103:1469): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.38:22-10.200.12.6:56558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:33.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.38:22-10.200.12.6:56558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:33.554000 audit[5265]: USER_ACCT pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:33.556676 sshd[5265]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:33.557435 sshd[5265]: Accepted publickey for core from 10.200.12.6 port 56558 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:33.555000 audit[5265]: CRED_ACQ pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:33.608854 kernel: audit: type=1101 audit(1707765633.554:1470): pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:33.608977 kernel: audit: type=1103 audit(1707765633.555:1471): pid=5265 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:33.625210 kernel: audit: type=1006 audit(1707765633.555:1472): pid=5265 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 19:20:33.555000 audit[5265]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd90b70b0 a2=3 a3=1 items=0 ppid=1 pid=5265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:33.654581 kernel: audit: type=1300 audit(1707765633.555:1472): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd90b70b0 a2=3 a3=1 items=0 ppid=1 pid=5265 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:33.555000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:33.664634 kernel: audit: type=1327 audit(1707765633.555:1472): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:33.667922 systemd[1]: Started session-12.scope. Feb 12 19:20:33.668786 systemd-logind[1334]: New session 12 of user core. Feb 12 19:20:33.672000 audit[5265]: USER_START pid=5265 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:33.703000 audit[5267]: CRED_ACQ pid=5267 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:33.729280 kernel: audit: type=1105 audit(1707765633.672:1473): pid=5265 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:33.729404 kernel: audit: type=1103 audit(1707765633.703:1474): pid=5267 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:33.714000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:33.755247 kernel: audit: type=1400 audit(1707765633.714:1475): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:33.714000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d21820 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:20:33.793621 kernel: audit: type=1300 audit(1707765633.714:1475): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001d21820 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:20:33.714000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:33.728000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:33.728000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011dffc0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:20:33.728000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:33.728000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:33.728000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40011dffe0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:20:33.728000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:33.728000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:20:33.728000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001cf1640 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:20:33.728000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:20:34.025961 sshd[5265]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:34.026000 audit[5265]: USER_END pid=5265 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.027000 audit[5265]: CRED_DISP pid=5265 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.029357 systemd-logind[1334]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:20:34.030061 systemd[1]: sshd@9-10.200.20.38:22-10.200.12.6:56558.service: Deactivated successfully. Feb 12 19:20:34.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.38:22-10.200.12.6:56558 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:34.030871 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:20:34.031379 systemd-logind[1334]: Removed session 12. Feb 12 19:20:34.096909 systemd[1]: Started sshd@10-10.200.20.38:22-10.200.12.6:56564.service. Feb 12 19:20:34.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.38:22-10.200.12.6:56564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:34.518000 audit[5277]: USER_ACCT pid=5277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.519075 sshd[5277]: Accepted publickey for core from 10.200.12.6 port 56564 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:34.519000 audit[5277]: CRED_ACQ pid=5277 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.519000 audit[5277]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe0f20b40 a2=3 a3=1 items=0 ppid=1 pid=5277 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:34.519000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:34.520627 sshd[5277]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:34.524959 systemd[1]: Started session-13.scope. Feb 12 19:20:34.525810 systemd-logind[1334]: New session 13 of user core. Feb 12 19:20:34.529000 audit[5277]: USER_START pid=5277 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:34.531000 audit[5279]: CRED_ACQ pid=5279 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:35.782751 sshd[5277]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:35.783000 audit[5277]: USER_END pid=5277 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:35.783000 audit[5277]: CRED_DISP pid=5277 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:35.786317 systemd[1]: sshd@10-10.200.20.38:22-10.200.12.6:56564.service: Deactivated successfully. Feb 12 19:20:35.785000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.38:22-10.200.12.6:56564 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:35.787189 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:20:35.787863 systemd-logind[1334]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:20:35.788867 systemd-logind[1334]: Removed session 13. Feb 12 19:20:35.857002 systemd[1]: Started sshd@11-10.200.20.38:22-10.200.12.6:56574.service. Feb 12 19:20:35.856000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.38:22-10.200.12.6:56574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:36.308000 audit[5287]: USER_ACCT pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:36.309788 sshd[5287]: Accepted publickey for core from 10.200.12.6 port 56574 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:36.310000 audit[5287]: CRED_ACQ pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:36.310000 audit[5287]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffce7b1050 a2=3 a3=1 items=0 ppid=1 pid=5287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:36.310000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:36.311383 sshd[5287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:36.315436 systemd-logind[1334]: New session 14 of user core. Feb 12 19:20:36.315966 systemd[1]: Started session-14.scope. Feb 12 19:20:36.320000 audit[5287]: USER_START pid=5287 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:36.321000 audit[5291]: CRED_ACQ pid=5291 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:36.709677 sshd[5287]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:36.710000 audit[5287]: USER_END pid=5287 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:36.710000 audit[5287]: CRED_DISP pid=5287 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:36.712476 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:20:36.713153 systemd-logind[1334]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:20:36.713291 systemd[1]: sshd@11-10.200.20.38:22-10.200.12.6:56574.service: Deactivated successfully. Feb 12 19:20:36.712000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.38:22-10.200.12.6:56574 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:36.714419 systemd-logind[1334]: Removed session 14. Feb 12 19:20:41.780613 systemd[1]: Started sshd@12-10.200.20.38:22-10.200.12.6:35968.service. Feb 12 19:20:41.814243 kernel: kauditd_printk_skb: 35 callbacks suppressed Feb 12 19:20:41.814315 kernel: audit: type=1130 audit(1707765641.780:1500): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.38:22-10.200.12.6:35968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:41.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.38:22-10.200.12.6:35968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:42.196000 audit[5305]: USER_ACCT pid=5305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.197870 sshd[5305]: Accepted publickey for core from 10.200.12.6 port 35968 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:42.229579 sshd[5305]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:42.228000 audit[5305]: CRED_ACQ pid=5305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.241292 systemd[1]: Started session-15.scope. Feb 12 19:20:42.242554 systemd-logind[1334]: New session 15 of user core. Feb 12 19:20:42.255542 kernel: audit: type=1101 audit(1707765642.196:1501): pid=5305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.255679 kernel: audit: type=1103 audit(1707765642.228:1502): pid=5305 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.273135 kernel: audit: type=1006 audit(1707765642.228:1503): pid=5305 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 19:20:42.228000 audit[5305]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff00d600 a2=3 a3=1 items=0 ppid=1 pid=5305 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:42.302191 kernel: audit: type=1300 audit(1707765642.228:1503): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffff00d600 a2=3 a3=1 items=0 ppid=1 pid=5305 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:42.228000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:42.312641 kernel: audit: type=1327 audit(1707765642.228:1503): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:42.256000 audit[5305]: USER_START pid=5305 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.343562 kernel: audit: type=1105 audit(1707765642.256:1504): pid=5305 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.273000 audit[5310]: CRED_ACQ pid=5310 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.368754 kernel: audit: type=1103 audit(1707765642.273:1505): pid=5310 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.612789 sshd[5305]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:42.612000 audit[5305]: USER_END pid=5305 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.615570 systemd-logind[1334]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:20:42.616767 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:20:42.617834 systemd-logind[1334]: Removed session 15. Feb 12 19:20:42.618346 systemd[1]: sshd@12-10.200.20.38:22-10.200.12.6:35968.service: Deactivated successfully. Feb 12 19:20:42.612000 audit[5305]: CRED_DISP pid=5305 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.668034 kernel: audit: type=1106 audit(1707765642.612:1506): pid=5305 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.668174 kernel: audit: type=1104 audit(1707765642.612:1507): pid=5305 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:42.617000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.38:22-10.200.12.6:35968 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:47.682521 systemd[1]: Started sshd@13-10.200.20.38:22-10.200.12.6:57238.service. Feb 12 19:20:47.713311 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:20:47.713415 kernel: audit: type=1130 audit(1707765647.681:1509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.38:22-10.200.12.6:57238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:47.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.38:22-10.200.12.6:57238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:48.101000 audit[5328]: USER_ACCT pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.103482 sshd[5328]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:48.104250 sshd[5328]: Accepted publickey for core from 10.200.12.6 port 57238 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:48.102000 audit[5328]: CRED_ACQ pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.154401 kernel: audit: type=1101 audit(1707765648.101:1510): pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.154548 kernel: audit: type=1103 audit(1707765648.102:1511): pid=5328 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.171185 kernel: audit: type=1006 audit(1707765648.102:1512): pid=5328 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:20:48.102000 audit[5328]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd94fa090 a2=3 a3=1 items=0 ppid=1 pid=5328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.198209 kernel: audit: type=1300 audit(1707765648.102:1512): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd94fa090 a2=3 a3=1 items=0 ppid=1 pid=5328 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:48.102000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:48.208197 kernel: audit: type=1327 audit(1707765648.102:1512): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:48.202703 systemd-logind[1334]: New session 16 of user core. Feb 12 19:20:48.208226 systemd[1]: Started session-16.scope. Feb 12 19:20:48.212000 audit[5328]: USER_START pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.213000 audit[5330]: CRED_ACQ pid=5330 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.266297 kernel: audit: type=1105 audit(1707765648.212:1513): pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.266429 kernel: audit: type=1103 audit(1707765648.213:1514): pid=5330 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.549715 sshd[5328]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:48.550000 audit[5328]: USER_END pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.552945 systemd-logind[1334]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:20:48.554502 systemd[1]: sshd@13-10.200.20.38:22-10.200.12.6:57238.service: Deactivated successfully. Feb 12 19:20:48.555506 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:20:48.556952 systemd-logind[1334]: Removed session 16. Feb 12 19:20:48.550000 audit[5328]: CRED_DISP pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.608829 kernel: audit: type=1106 audit(1707765648.550:1515): pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.608965 kernel: audit: type=1104 audit(1707765648.550:1516): pid=5328 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:48.551000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.38:22-10.200.12.6:57238 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:53.153390 systemd[1]: run-containerd-runc-k8s.io-064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e-runc.w5OtV8.mount: Deactivated successfully. Feb 12 19:20:53.655612 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:20:53.655750 kernel: audit: type=1130 audit(1707765653.624:1518): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.38:22-10.200.12.6:57248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:53.624000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.38:22-10.200.12.6:57248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:53.626199 systemd[1]: Started sshd@14-10.200.20.38:22-10.200.12.6:57248.service. Feb 12 19:20:54.077000 audit[5418]: USER_ACCT pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.082697 sshd[5418]: Accepted publickey for core from 10.200.12.6 port 57248 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:20:54.084487 sshd[5418]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:20:54.077000 audit[5418]: CRED_ACQ pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.130466 kernel: audit: type=1101 audit(1707765654.077:1519): pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.130616 kernel: audit: type=1103 audit(1707765654.077:1520): pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.147387 kernel: audit: type=1006 audit(1707765654.077:1521): pid=5418 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 19:20:54.077000 audit[5418]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3a71d60 a2=3 a3=1 items=0 ppid=1 pid=5418 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:54.173862 kernel: audit: type=1300 audit(1707765654.077:1521): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3a71d60 a2=3 a3=1 items=0 ppid=1 pid=5418 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:20:54.077000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:54.185737 kernel: audit: type=1327 audit(1707765654.077:1521): proctitle=737368643A20636F7265205B707269765D Feb 12 19:20:54.186713 systemd-logind[1334]: New session 17 of user core. Feb 12 19:20:54.187187 systemd[1]: Started session-17.scope. Feb 12 19:20:54.189000 audit[5418]: USER_START pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.189000 audit[5420]: CRED_ACQ pid=5420 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.245347 kernel: audit: type=1105 audit(1707765654.189:1522): pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.245474 kernel: audit: type=1103 audit(1707765654.189:1523): pid=5420 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.514797 sshd[5418]: pam_unix(sshd:session): session closed for user core Feb 12 19:20:54.514000 audit[5418]: USER_END pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.517151 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:20:54.517978 systemd[1]: sshd@14-10.200.20.38:22-10.200.12.6:57248.service: Deactivated successfully. Feb 12 19:20:54.514000 audit[5418]: CRED_DISP pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.545014 systemd-logind[1334]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:20:54.545935 systemd-logind[1334]: Removed session 17. Feb 12 19:20:54.570153 kernel: audit: type=1106 audit(1707765654.514:1524): pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.570260 kernel: audit: type=1104 audit(1707765654.514:1525): pid=5418 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:20:54.516000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.38:22-10.200.12.6:57248 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:59.590000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.38:22-10.200.12.6:51922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:20:59.591707 systemd[1]: Started sshd@15-10.200.20.38:22-10.200.12.6:51922.service. Feb 12 19:20:59.597292 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:20:59.597388 kernel: audit: type=1130 audit(1707765659.590:1527): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.38:22-10.200.12.6:51922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:00.039000 audit[5451]: USER_ACCT pid=5451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.041113 sshd[5451]: Accepted publickey for core from 10.200.12.6 port 51922 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:00.043387 sshd[5451]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:00.041000 audit[5451]: CRED_ACQ pid=5451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.094791 kernel: audit: type=1101 audit(1707765660.039:1528): pid=5451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.095100 kernel: audit: type=1103 audit(1707765660.041:1529): pid=5451 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.095169 kernel: audit: type=1006 audit(1707765660.041:1530): pid=5451 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 19:21:00.041000 audit[5451]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe45f17a0 a2=3 a3=1 items=0 ppid=1 pid=5451 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:00.137036 kernel: audit: type=1300 audit(1707765660.041:1530): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe45f17a0 a2=3 a3=1 items=0 ppid=1 pid=5451 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:00.041000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:00.142410 systemd[1]: Started session-18.scope. Feb 12 19:21:00.143180 systemd-logind[1334]: New session 18 of user core. Feb 12 19:21:00.152777 kernel: audit: type=1327 audit(1707765660.041:1530): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:00.153000 audit[5451]: USER_START pid=5451 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.155000 audit[5453]: CRED_ACQ pid=5453 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.185803 kernel: audit: type=1105 audit(1707765660.153:1531): pid=5451 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.210765 kernel: audit: type=1103 audit(1707765660.155:1532): pid=5453 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.472031 sshd[5451]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:00.471000 audit[5451]: USER_END pid=5451 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.475485 systemd-logind[1334]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:21:00.476529 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:21:00.477620 systemd-logind[1334]: Removed session 18. Feb 12 19:21:00.478165 systemd[1]: sshd@15-10.200.20.38:22-10.200.12.6:51922.service: Deactivated successfully. Feb 12 19:21:00.472000 audit[5451]: CRED_DISP pid=5451 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.526223 kernel: audit: type=1106 audit(1707765660.471:1533): pid=5451 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.526350 kernel: audit: type=1104 audit(1707765660.472:1534): pid=5451 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.38:22-10.200.12.6:51922 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:00.541357 systemd[1]: Started sshd@16-10.200.20.38:22-10.200.12.6:51924.service. Feb 12 19:21:00.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.38:22-10.200.12.6:51924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:00.956000 audit[5463]: USER_ACCT pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.957950 sshd[5463]: Accepted publickey for core from 10.200.12.6 port 51924 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:00.957000 audit[5463]: CRED_ACQ pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.957000 audit[5463]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff1656e70 a2=3 a3=1 items=0 ppid=1 pid=5463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:00.957000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:00.959701 sshd[5463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:00.964268 systemd[1]: Started session-19.scope. Feb 12 19:21:00.965001 systemd-logind[1334]: New session 19 of user core. Feb 12 19:21:00.967000 audit[5463]: USER_START pid=5463 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:00.969000 audit[5465]: CRED_ACQ pid=5465 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:01.399519 sshd[5463]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:01.398000 audit[5463]: USER_END pid=5463 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:01.399000 audit[5463]: CRED_DISP pid=5463 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:01.402492 systemd[1]: sshd@16-10.200.20.38:22-10.200.12.6:51924.service: Deactivated successfully. Feb 12 19:21:01.402703 systemd-logind[1334]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:21:01.400000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.38:22-10.200.12.6:51924 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:01.403282 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:21:01.404141 systemd-logind[1334]: Removed session 19. Feb 12 19:21:01.469668 systemd[1]: Started sshd@17-10.200.20.38:22-10.200.12.6:51940.service. Feb 12 19:21:01.468000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.38:22-10.200.12.6:51940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:01.885000 audit[5473]: USER_ACCT pid=5473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:01.887198 sshd[5473]: Accepted publickey for core from 10.200.12.6 port 51940 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:01.886000 audit[5473]: CRED_ACQ pid=5473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:01.886000 audit[5473]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd4f47ae0 a2=3 a3=1 items=0 ppid=1 pid=5473 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:01.886000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:01.888786 sshd[5473]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:01.892543 systemd-logind[1334]: New session 20 of user core. Feb 12 19:21:01.893050 systemd[1]: Started session-20.scope. Feb 12 19:21:01.895000 audit[5473]: USER_START pid=5473 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:01.897000 audit[5475]: CRED_ACQ pid=5475 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.013000 audit[5486]: NETFILTER_CFG table=filter:130 family=2 entries=8 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.013000 audit[5486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffdff20cb0 a2=0 a3=ffff967a36c0 items=0 ppid=2641 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.013000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.015000 audit[5486]: NETFILTER_CFG table=nat:131 family=2 entries=22 op=nft_register_rule pid=5486 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.015000 audit[5486]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffdff20cb0 a2=0 a3=ffff967a36c0 items=0 ppid=2641 pid=5486 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.015000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.037000 audit[5488]: NETFILTER_CFG table=filter:132 family=2 entries=20 op=nft_register_rule pid=5488 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.037000 audit[5488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=fffff785c390 a2=0 a3=ffff9fb996c0 items=0 ppid=2641 pid=5488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.037000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.038000 audit[5488]: NETFILTER_CFG table=nat:133 family=2 entries=22 op=nft_register_rule pid=5488 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:03.038000 audit[5488]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=fffff785c390 a2=0 a3=ffff9fb996c0 items=0 ppid=2641 pid=5488 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.038000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:03.063249 sshd[5473]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:03.063000 audit[5473]: USER_END pid=5473 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.063000 audit[5473]: CRED_DISP pid=5473 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.067268 systemd[1]: sshd@17-10.200.20.38:22-10.200.12.6:51940.service: Deactivated successfully. Feb 12 19:21:03.065000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.38:22-10.200.12.6:51940 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:03.068220 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:21:03.068913 systemd-logind[1334]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:21:03.070046 systemd-logind[1334]: Removed session 20. Feb 12 19:21:03.132000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.38:22-10.200.12.6:51944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:03.133843 systemd[1]: Started sshd@18-10.200.20.38:22-10.200.12.6:51944.service. Feb 12 19:21:03.557835 sshd[5491]: Accepted publickey for core from 10.200.12.6 port 51944 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:03.556000 audit[5491]: USER_ACCT pid=5491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.559554 sshd[5491]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:03.557000 audit[5491]: CRED_ACQ pid=5491 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.557000 audit[5491]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd5ddbb0 a2=3 a3=1 items=0 ppid=1 pid=5491 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:03.557000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:03.564129 systemd-logind[1334]: New session 21 of user core. Feb 12 19:21:03.564702 systemd[1]: Started session-21.scope. Feb 12 19:21:03.567000 audit[5491]: USER_START pid=5491 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:03.568000 audit[5493]: CRED_ACQ pid=5493 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.204848 sshd[5491]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:04.204000 audit[5491]: USER_END pid=5491 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.205000 audit[5491]: CRED_DISP pid=5491 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.208270 systemd[1]: sshd@18-10.200.20.38:22-10.200.12.6:51944.service: Deactivated successfully. Feb 12 19:21:04.206000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.38:22-10.200.12.6:51944 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:04.209120 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:21:04.209681 systemd-logind[1334]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:21:04.210681 systemd-logind[1334]: Removed session 21. Feb 12 19:21:04.272000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.38:22-10.200.12.6:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:04.274439 systemd[1]: Started sshd@19-10.200.20.38:22-10.200.12.6:51948.service. Feb 12 19:21:04.696689 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 12 19:21:04.696874 kernel: audit: type=1101 audit(1707765664.689:1568): pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.689000 audit[5504]: USER_ACCT pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.697166 sshd[5504]: Accepted publickey for core from 10.200.12.6 port 51948 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:04.699074 sshd[5504]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:04.703780 systemd[1]: Started session-22.scope. Feb 12 19:21:04.704971 systemd-logind[1334]: New session 22 of user core. Feb 12 19:21:04.695000 audit[5504]: CRED_ACQ pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.748389 kernel: audit: type=1103 audit(1707765664.695:1569): pid=5504 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.770586 kernel: audit: type=1006 audit(1707765664.695:1570): pid=5504 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 19:21:04.770730 kernel: audit: type=1300 audit(1707765664.695:1570): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe01c8fa0 a2=3 a3=1 items=0 ppid=1 pid=5504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:04.695000 audit[5504]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe01c8fa0 a2=3 a3=1 items=0 ppid=1 pid=5504 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:04.695000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:04.804378 kernel: audit: type=1327 audit(1707765664.695:1570): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:04.721000 audit[5504]: USER_START pid=5504 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.832972 kernel: audit: type=1105 audit(1707765664.721:1571): pid=5504 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.721000 audit[5506]: CRED_ACQ pid=5506 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:04.859881 kernel: audit: type=1103 audit(1707765664.721:1572): pid=5506 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:05.074713 sshd[5504]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:05.074000 audit[5504]: USER_END pid=5504 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:05.077325 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:21:05.077966 systemd[1]: sshd@19-10.200.20.38:22-10.200.12.6:51948.service: Deactivated successfully. Feb 12 19:21:05.079890 systemd-logind[1334]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:21:05.080699 systemd-logind[1334]: Removed session 22. Feb 12 19:21:05.074000 audit[5504]: CRED_DISP pid=5504 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:05.129410 kernel: audit: type=1106 audit(1707765665.074:1573): pid=5504 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:05.129537 kernel: audit: type=1104 audit(1707765665.074:1574): pid=5504 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:05.074000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.38:22-10.200.12.6:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:05.155602 kernel: audit: type=1131 audit(1707765665.074:1575): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.38:22-10.200.12.6:51948 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:09.408000 audit[5523]: NETFILTER_CFG table=filter:134 family=2 entries=20 op=nft_register_rule pid=5523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:09.408000 audit[5523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe2855610 a2=0 a3=ffff9abd06c0 items=0 ppid=2641 pid=5523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:09.408000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:09.411000 audit[5523]: NETFILTER_CFG table=nat:135 family=2 entries=106 op=nft_register_chain pid=5523 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:21:09.411000 audit[5523]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffe2855610 a2=0 a3=ffff9abd06c0 items=0 ppid=2641 pid=5523 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:09.411000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:21:10.149000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.38:22-10.200.12.6:45094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:10.149947 systemd[1]: Started sshd@20-10.200.20.38:22-10.200.12.6:45094.service. Feb 12 19:21:10.157051 kernel: kauditd_printk_skb: 6 callbacks suppressed Feb 12 19:21:10.157149 kernel: audit: type=1130 audit(1707765670.149:1578): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.38:22-10.200.12.6:45094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:10.572000 audit[5526]: USER_ACCT pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.574381 sshd[5526]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:10.576392 sshd[5526]: Accepted publickey for core from 10.200.12.6 port 45094 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:10.573000 audit[5526]: CRED_ACQ pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.601625 kernel: audit: type=1101 audit(1707765670.572:1579): pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.601768 kernel: audit: type=1103 audit(1707765670.573:1580): pid=5526 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.603460 systemd-logind[1334]: New session 23 of user core. Feb 12 19:21:10.604097 systemd[1]: Started session-23.scope. Feb 12 19:21:10.642674 kernel: audit: type=1006 audit(1707765670.573:1581): pid=5526 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 19:21:10.642980 kernel: audit: type=1300 audit(1707765670.573:1581): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd592d7f0 a2=3 a3=1 items=0 ppid=1 pid=5526 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:10.573000 audit[5526]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd592d7f0 a2=3 a3=1 items=0 ppid=1 pid=5526 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:10.573000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:10.678189 kernel: audit: type=1327 audit(1707765670.573:1581): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:10.678324 kernel: audit: type=1105 audit(1707765670.608:1582): pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.608000 audit[5526]: USER_START pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.609000 audit[5528]: CRED_ACQ pid=5528 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.731150 kernel: audit: type=1103 audit(1707765670.609:1583): pid=5528 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.944688 sshd[5526]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:10.946000 audit[5526]: USER_END pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.949000 systemd-logind[1334]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:21:10.950118 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:21:10.950693 systemd[1]: sshd@20-10.200.20.38:22-10.200.12.6:45094.service: Deactivated successfully. Feb 12 19:21:10.952440 systemd-logind[1334]: Removed session 23. Feb 12 19:21:10.946000 audit[5526]: CRED_DISP pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:11.002284 kernel: audit: type=1106 audit(1707765670.946:1584): pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:11.002424 kernel: audit: type=1104 audit(1707765670.946:1585): pid=5526 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:10.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.38:22-10.200.12.6:45094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:16.051618 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:21:16.051787 kernel: audit: type=1130 audit(1707765676.020:1587): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.38:22-10.200.12.6:45104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:16.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.38:22-10.200.12.6:45104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:16.020786 systemd[1]: Started sshd@21-10.200.20.38:22-10.200.12.6:45104.service. Feb 12 19:21:16.469000 audit[5538]: USER_ACCT pid=5538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.470883 sshd[5538]: Accepted publickey for core from 10.200.12.6 port 45104 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:16.472811 sshd[5538]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:16.471000 audit[5538]: CRED_ACQ pid=5538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.525470 kernel: audit: type=1101 audit(1707765676.469:1588): pid=5538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.526037 kernel: audit: type=1103 audit(1707765676.471:1589): pid=5538 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.542447 kernel: audit: type=1006 audit(1707765676.471:1590): pid=5538 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:21:16.471000 audit[5538]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf483b90 a2=3 a3=1 items=0 ppid=1 pid=5538 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:16.571711 kernel: audit: type=1300 audit(1707765676.471:1590): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdf483b90 a2=3 a3=1 items=0 ppid=1 pid=5538 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:16.471000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:16.581377 kernel: audit: type=1327 audit(1707765676.471:1590): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:16.581831 systemd-logind[1334]: New session 24 of user core. Feb 12 19:21:16.582301 systemd[1]: Started session-24.scope. Feb 12 19:21:16.586000 audit[5538]: USER_START pid=5538 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.586000 audit[5552]: CRED_ACQ pid=5552 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.644220 kernel: audit: type=1105 audit(1707765676.586:1591): pid=5538 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.644313 kernel: audit: type=1103 audit(1707765676.586:1592): pid=5552 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.906824 sshd[5538]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:16.907000 audit[5538]: USER_END pid=5538 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.915539 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:21:16.916312 systemd[1]: sshd@21-10.200.20.38:22-10.200.12.6:45104.service: Deactivated successfully. Feb 12 19:21:16.941386 systemd-logind[1334]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:21:16.913000 audit[5538]: CRED_DISP pid=5538 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.966786 kernel: audit: type=1106 audit(1707765676.907:1593): pid=5538 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.966917 kernel: audit: type=1104 audit(1707765676.913:1594): pid=5538 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:16.913000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.38:22-10.200.12.6:45104 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:16.967500 systemd-logind[1334]: Removed session 24. Feb 12 19:21:18.966000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:18.966000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40013993c0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:18.966000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:18.999000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:18.999000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f65470 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:18.999000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:19.144000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:19.144000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=40164541b0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:21:19.144000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:19.144000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:19.144000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4016420fc0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:21:19.144000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:19.183000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:19.183000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4006af4c20 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:21:19.183000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:19.184000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:19.184000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4016420ff0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:21:19.184000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:19.190000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:19.190000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4006a39ea0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:21:19.190000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:19.191000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:19.191000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=4016454540 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:21:19.191000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:21:21.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.38:22-10.200.12.6:46600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:21.978187 systemd[1]: Started sshd@22-10.200.20.38:22-10.200.12.6:46600.service. Feb 12 19:21:21.984421 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 19:21:21.984507 kernel: audit: type=1130 audit(1707765681.977:1604): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.38:22-10.200.12.6:46600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:22.399000 audit[5584]: USER_ACCT pid=5584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.400470 sshd[5584]: Accepted publickey for core from 10.200.12.6 port 46600 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:22.428761 kernel: audit: type=1101 audit(1707765682.399:1605): pid=5584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.429212 sshd[5584]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:22.427000 audit[5584]: CRED_ACQ pid=5584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.472464 kernel: audit: type=1103 audit(1707765682.427:1606): pid=5584 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.472579 kernel: audit: type=1006 audit(1707765682.428:1607): pid=5584 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 19:21:22.428000 audit[5584]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6ed4780 a2=3 a3=1 items=0 ppid=1 pid=5584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:22.500144 kernel: audit: type=1300 audit(1707765682.428:1607): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc6ed4780 a2=3 a3=1 items=0 ppid=1 pid=5584 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:22.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:22.509889 kernel: audit: type=1327 audit(1707765682.428:1607): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:22.512887 systemd-logind[1334]: New session 25 of user core. Feb 12 19:21:22.513430 systemd[1]: Started session-25.scope. Feb 12 19:21:22.516000 audit[5584]: USER_START pid=5584 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.548000 audit[5586]: CRED_ACQ pid=5586 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.573693 kernel: audit: type=1105 audit(1707765682.516:1608): pid=5584 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.573813 kernel: audit: type=1103 audit(1707765682.548:1609): pid=5586 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.847814 sshd[5584]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:22.847000 audit[5584]: USER_END pid=5584 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.848000 audit[5584]: CRED_DISP pid=5584 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.880836 systemd[1]: sshd@22-10.200.20.38:22-10.200.12.6:46600.service: Deactivated successfully. Feb 12 19:21:22.881655 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 19:21:22.883438 systemd-logind[1334]: Session 25 logged out. Waiting for processes to exit. Feb 12 19:21:22.884336 systemd-logind[1334]: Removed session 25. Feb 12 19:21:22.905948 kernel: audit: type=1106 audit(1707765682.847:1610): pid=5584 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.906084 kernel: audit: type=1104 audit(1707765682.848:1611): pid=5584 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:22.879000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.38:22-10.200.12.6:46600 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:23.152806 systemd[1]: run-containerd-runc-k8s.io-064b681761f0c282c1dcf3e1acd1499fb88b4791c647cfd63ccf44127d6d046e-runc.FmTrfV.mount: Deactivated successfully. Feb 12 19:21:23.186276 systemd[1]: run-containerd-runc-k8s.io-2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8-runc.TvfDzc.mount: Deactivated successfully. Feb 12 19:21:26.170341 systemd[1]: run-containerd-runc-k8s.io-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647-runc.DVE9bW.mount: Deactivated successfully. Feb 12 19:21:27.341000 audit[4733]: AVC avc: denied { watch } for pid=4733 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.317804862/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c786 tclass=file permissive=0 Feb 12 19:21:27.348053 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:21:27.348177 kernel: audit: type=1400 audit(1707765687.341:1613): avc: denied { watch } for pid=4733 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.317804862/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c162,c786 tclass=file permissive=0 Feb 12 19:21:27.341000 audit[4733]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001a43ee0 a2=fc6 a3=0 items=0 ppid=4477 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 key=(null) Feb 12 19:21:27.411357 kernel: audit: type=1300 audit(1707765687.341:1613): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001a43ee0 a2=fc6 a3=0 items=0 ppid=4477 pid=4733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c162,c786 key=(null) Feb 12 19:21:27.341000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:21:27.441624 kernel: audit: type=1327 audit(1707765687.341:1613): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:21:27.719000 audit[4780]: AVC avc: denied { watch } for pid=4780 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.1103776437/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c509,c551 tclass=file permissive=0 Feb 12 19:21:27.719000 audit[4780]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001dc5960 a2=fc6 a3=0 items=0 ppid=4546 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 key=(null) Feb 12 19:21:27.783326 kernel: audit: type=1400 audit(1707765687.719:1614): avc: denied { watch } for pid=4780 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_18_22.1103776437/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c509,c551 tclass=file permissive=0 Feb 12 19:21:27.783445 kernel: audit: type=1300 audit(1707765687.719:1614): arch=c00000b7 syscall=27 success=no exit=-13 a0=9 a1=4001dc5960 a2=fc6 a3=0 items=0 ppid=4546 pid=4780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c509,c551 key=(null) Feb 12 19:21:27.719000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:21:27.812686 kernel: audit: type=1327 audit(1707765687.719:1614): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:21:27.918000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.38:22-10.200.12.6:44452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:27.919023 systemd[1]: Started sshd@23-10.200.20.38:22-10.200.12.6:44452.service. Feb 12 19:21:27.948758 kernel: audit: type=1130 audit(1707765687.918:1615): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.38:22-10.200.12.6:44452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:28.333000 audit[5657]: USER_ACCT pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:28.334069 sshd[5657]: Accepted publickey for core from 10.200.12.6 port 44452 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:28.362751 kernel: audit: type=1101 audit(1707765688.333:1616): pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:28.363000 audit[5657]: CRED_ACQ pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:28.364326 sshd[5657]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:28.407749 kernel: audit: type=1103 audit(1707765688.363:1617): pid=5657 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:28.407871 kernel: audit: type=1006 audit(1707765688.363:1618): pid=5657 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 19:21:28.363000 audit[5657]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcd1635f0 a2=3 a3=1 items=0 ppid=1 pid=5657 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:28.363000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:28.411638 systemd-logind[1334]: New session 26 of user core. Feb 12 19:21:28.412152 systemd[1]: Started session-26.scope. Feb 12 19:21:28.415000 audit[5657]: USER_START pid=5657 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:28.417000 audit[5659]: CRED_ACQ pid=5659 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:28.730122 sshd[5657]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:28.730000 audit[5657]: USER_END pid=5657 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:28.730000 audit[5657]: CRED_DISP pid=5657 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:28.732670 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 19:21:28.733415 systemd-logind[1334]: Session 26 logged out. Waiting for processes to exit. Feb 12 19:21:28.732000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.38:22-10.200.12.6:44452 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:28.733516 systemd[1]: sshd@23-10.200.20.38:22-10.200.12.6:44452.service: Deactivated successfully. Feb 12 19:21:28.735178 systemd-logind[1334]: Removed session 26. Feb 12 19:21:33.714000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:33.721055 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:21:33.721125 kernel: audit: type=1400 audit(1707765693.714:1624): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:33.714000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f10e40 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:33.779616 kernel: audit: type=1300 audit(1707765693.714:1624): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000f10e40 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:33.714000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:33.799518 systemd[1]: Started sshd@24-10.200.20.38:22-10.200.12.6:44468.service. Feb 12 19:21:33.807509 kernel: audit: type=1327 audit(1707765693.714:1624): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:33.808862 kernel: audit: type=1400 audit(1707765693.729:1625): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:33.729000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:33.729000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d436e0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:33.869475 kernel: audit: type=1300 audit(1707765693.729:1625): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d436e0 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:33.869772 kernel: audit: type=1327 audit(1707765693.729:1625): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:33.729000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:33.729000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:33.923576 kernel: audit: type=1400 audit(1707765693.729:1626): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:33.729000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d43700 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:33.958017 kernel: audit: type=1300 audit(1707765693.729:1626): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d43700 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:33.958270 kernel: audit: type=1327 audit(1707765693.729:1626): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:33.729000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:33.729000 audit[2347]: AVC avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:34.014937 kernel: audit: type=1400 audit(1707765693.729:1627): avc: denied { watch } for pid=2347 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:33.729000 audit[2347]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000d43720 a2=fc6 a3=0 items=0 ppid=2202 pid=2347 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:33.729000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:33.805000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.38:22-10.200.12.6:44468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:34.217000 audit[5668]: USER_ACCT pid=5668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:34.218279 sshd[5668]: Accepted publickey for core from 10.200.12.6 port 44468 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:34.218000 audit[5668]: CRED_ACQ pid=5668 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:34.218000 audit[5668]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdfabce10 a2=3 a3=1 items=0 ppid=1 pid=5668 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:34.218000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:34.219917 sshd[5668]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:34.223860 systemd-logind[1334]: New session 27 of user core. Feb 12 19:21:34.224366 systemd[1]: Started session-27.scope. Feb 12 19:21:34.227000 audit[5668]: USER_START pid=5668 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:34.228000 audit[5670]: CRED_ACQ pid=5670 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:34.586889 sshd[5668]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:34.587000 audit[5668]: USER_END pid=5668 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:34.587000 audit[5668]: CRED_DISP pid=5668 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:34.589777 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 19:21:34.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.38:22-10.200.12.6:44468 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:34.590644 systemd-logind[1334]: Session 27 logged out. Waiting for processes to exit. Feb 12 19:21:34.590831 systemd[1]: sshd@24-10.200.20.38:22-10.200.12.6:44468.service: Deactivated successfully. Feb 12 19:21:34.592129 systemd-logind[1334]: Removed session 27. Feb 12 19:21:39.657809 systemd[1]: Started sshd@25-10.200.20.38:22-10.200.12.6:44098.service. Feb 12 19:21:39.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.38:22-10.200.12.6:44098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:39.664412 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:21:39.664531 kernel: audit: type=1130 audit(1707765699.657:1637): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.38:22-10.200.12.6:44098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:40.074000 audit[5682]: USER_ACCT pid=5682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.075283 sshd[5682]: Accepted publickey for core from 10.200.12.6 port 44098 ssh2: RSA SHA256:SfUjs7MZHb4dm/nWS32sXF6T7NXqXtYp+5K7LVbLt6U Feb 12 19:21:40.077123 sshd[5682]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:21:40.076000 audit[5682]: CRED_ACQ pid=5682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.125778 kernel: audit: type=1101 audit(1707765700.074:1638): pid=5682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.125916 kernel: audit: type=1103 audit(1707765700.076:1639): pid=5682 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.142719 kernel: audit: type=1006 audit(1707765700.076:1640): pid=5682 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 12 19:21:40.142840 kernel: audit: type=1300 audit(1707765700.076:1640): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe63e4ec0 a2=3 a3=1 items=0 ppid=1 pid=5682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:40.076000 audit[5682]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe63e4ec0 a2=3 a3=1 items=0 ppid=1 pid=5682 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:40.076000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:40.177407 kernel: audit: type=1327 audit(1707765700.076:1640): proctitle=737368643A20636F7265205B707269765D Feb 12 19:21:40.180211 systemd[1]: Started session-28.scope. Feb 12 19:21:40.180788 systemd-logind[1334]: New session 28 of user core. Feb 12 19:21:40.184000 audit[5682]: USER_START pid=5682 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.216763 kernel: audit: type=1105 audit(1707765700.184:1641): pid=5682 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.216000 audit[5684]: CRED_ACQ pid=5684 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.241751 kernel: audit: type=1103 audit(1707765700.216:1642): pid=5684 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.513289 sshd[5682]: pam_unix(sshd:session): session closed for user core Feb 12 19:21:40.513000 audit[5682]: USER_END pid=5682 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.515000 audit[5682]: CRED_DISP pid=5682 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.544445 systemd[1]: sshd@25-10.200.20.38:22-10.200.12.6:44098.service: Deactivated successfully. Feb 12 19:21:40.569178 kernel: audit: type=1106 audit(1707765700.513:1643): pid=5682 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.569277 kernel: audit: type=1104 audit(1707765700.515:1644): pid=5682 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:21:40.543000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.38:22-10.200.12.6:44098 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:21:40.545304 systemd[1]: session-28.scope: Deactivated successfully. Feb 12 19:21:40.568716 systemd-logind[1334]: Session 28 logged out. Waiting for processes to exit. Feb 12 19:21:40.570082 systemd-logind[1334]: Removed session 28. Feb 12 19:21:48.484302 systemd[1]: run-containerd-runc-k8s.io-baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c-runc.hkpADa.mount: Deactivated successfully. Feb 12 19:21:49.217937 systemd[1]: run-containerd-runc-k8s.io-a0992839cb88788fedfd0f09e75c0a980158112b6f0583ad30ba13864adff647-runc.gVbEx8.mount: Deactivated successfully. Feb 12 19:21:53.188216 systemd[1]: run-containerd-runc-k8s.io-2b4e0bcb9fe64bd573d54ec7162b6bb49310232fcd5f7375fcd9b42bf5b00cb8-runc.gN5yrp.mount: Deactivated successfully. Feb 12 19:21:54.284000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:21:54.284557 systemd[1]: cri-containerd-a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f.scope: Deactivated successfully. Feb 12 19:21:54.284918 systemd[1]: cri-containerd-a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f.scope: Consumed 6.091s CPU time. Feb 12 19:21:54.290483 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:21:54.290604 kernel: audit: type=1334 audit(1707765714.284:1646): prog-id=124 op=UNLOAD Feb 12 19:21:54.300000 audit: BPF prog-id=127 op=UNLOAD Feb 12 19:21:54.311884 kernel: audit: type=1334 audit(1707765714.300:1647): prog-id=127 op=UNLOAD Feb 12 19:21:54.318368 env[1346]: time="2024-02-12T19:21:54.318321019Z" level=info msg="shim disconnected" id=a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f Feb 12 19:21:54.318843 env[1346]: time="2024-02-12T19:21:54.318810383Z" level=warning msg="cleaning up after shim disconnected" id=a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f namespace=k8s.io Feb 12 19:21:54.318935 env[1346]: time="2024-02-12T19:21:54.318920144Z" level=info msg="cleaning up dead shim" Feb 12 19:21:54.318963 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f-rootfs.mount: Deactivated successfully. Feb 12 19:21:54.326646 env[1346]: time="2024-02-12T19:21:54.326603216Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:21:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5787 runtime=io.containerd.runc.v2\n" Feb 12 19:21:54.644281 systemd[1]: cri-containerd-b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7.scope: Deactivated successfully. Feb 12 19:21:54.644586 systemd[1]: cri-containerd-b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7.scope: Consumed 3.072s CPU time. Feb 12 19:21:54.649000 audit: BPF prog-id=91 op=UNLOAD Feb 12 19:21:54.649000 audit: BPF prog-id=112 op=UNLOAD Feb 12 19:21:54.665415 kernel: audit: type=1334 audit(1707765714.649:1648): prog-id=91 op=UNLOAD Feb 12 19:21:54.665548 kernel: audit: type=1334 audit(1707765714.649:1649): prog-id=112 op=UNLOAD Feb 12 19:21:54.677240 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7-rootfs.mount: Deactivated successfully. Feb 12 19:21:54.678401 env[1346]: time="2024-02-12T19:21:54.678359686Z" level=info msg="shim disconnected" id=b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7 Feb 12 19:21:54.678582 env[1346]: time="2024-02-12T19:21:54.678564008Z" level=warning msg="cleaning up after shim disconnected" id=b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7 namespace=k8s.io Feb 12 19:21:54.678659 env[1346]: time="2024-02-12T19:21:54.678645569Z" level=info msg="cleaning up dead shim" Feb 12 19:21:54.686340 env[1346]: time="2024-02-12T19:21:54.686294561Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:21:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5813 runtime=io.containerd.runc.v2\n" Feb 12 19:21:54.752023 kubelet[2463]: I0212 19:21:54.751678 2463 scope.go:115] "RemoveContainer" containerID="a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f" Feb 12 19:21:54.754110 env[1346]: time="2024-02-12T19:21:54.754038238Z" level=info msg="CreateContainer within sandbox \"57664a578a54cf1d71ce73932e73181a4093a2017bd2e209bfbddc5c5a1707a6\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 12 19:21:54.754378 kubelet[2463]: I0212 19:21:54.754361 2463 scope.go:115] "RemoveContainer" containerID="b7eda704c385b515b178b70ce5f3c35a60b1424c2680c23fca25381d4e7092e7" Feb 12 19:21:54.756836 env[1346]: time="2024-02-12T19:21:54.756802344Z" level=info msg="CreateContainer within sandbox \"5e220ce475ac0dfd0e4908d26db6732699dc1f0791f91a33479e691c43bd73f4\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 12 19:21:54.791381 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1137582909.mount: Deactivated successfully. Feb 12 19:21:54.807542 env[1346]: time="2024-02-12T19:21:54.807494581Z" level=info msg="CreateContainer within sandbox \"57664a578a54cf1d71ce73932e73181a4093a2017bd2e209bfbddc5c5a1707a6\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"add0c8f084a05c47b73b2b79a352eec28288ff0b8d385dd337b149a20687a213\"" Feb 12 19:21:54.808180 env[1346]: time="2024-02-12T19:21:54.808156628Z" level=info msg="StartContainer for \"add0c8f084a05c47b73b2b79a352eec28288ff0b8d385dd337b149a20687a213\"" Feb 12 19:21:54.822804 env[1346]: time="2024-02-12T19:21:54.822759565Z" level=info msg="CreateContainer within sandbox \"5e220ce475ac0dfd0e4908d26db6732699dc1f0791f91a33479e691c43bd73f4\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"d3dfa20b54cea4aa25f48035a9a373b4c8a1bc0f3b58dbc5d8b2255b8ab2cf28\"" Feb 12 19:21:54.824059 env[1346]: time="2024-02-12T19:21:54.824007257Z" level=info msg="StartContainer for \"d3dfa20b54cea4aa25f48035a9a373b4c8a1bc0f3b58dbc5d8b2255b8ab2cf28\"" Feb 12 19:21:54.830883 systemd[1]: Started cri-containerd-add0c8f084a05c47b73b2b79a352eec28288ff0b8d385dd337b149a20687a213.scope. Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886589 kernel: audit: type=1400 audit(1707765714.846:1650): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886712 kernel: audit: type=1400 audit(1707765714.846:1651): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.906148 kernel: audit: type=1400 audit(1707765714.846:1652): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.906465 kernel: audit: type=1400 audit(1707765714.846:1653): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.926477 systemd[1]: Started cri-containerd-d3dfa20b54cea4aa25f48035a9a373b4c8a1bc0f3b58dbc5d8b2255b8ab2cf28.scope. Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.946528 kernel: audit: type=1400 audit(1707765714.846:1654): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.969549 kernel: audit: type=1400 audit(1707765714.846:1655): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.846000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.846000 audit: BPF prog-id=202 op=LOAD Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=2589 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643063386630383461303563343762373362326237396133353265 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2589 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643063386630383461303563343762373362326237396133353265 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.847000 audit: BPF prog-id=203 op=LOAD Feb 12 19:21:54.847000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=2589 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.847000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643063386630383461303563343762373362326237396133353265 Feb 12 19:21:54.872000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.872000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.872000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.872000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.872000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.872000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.872000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.872000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.872000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.872000 audit: BPF prog-id=204 op=LOAD Feb 12 19:21:54.872000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=2589 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.872000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643063386630383461303563343762373362326237396133353265 Feb 12 19:21:54.886000 audit: BPF prog-id=204 op=UNLOAD Feb 12 19:21:54.886000 audit: BPF prog-id=203 op=UNLOAD Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { perfmon } for pid=5835 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit[5835]: AVC avc: denied { bpf } for pid=5835 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.886000 audit: BPF prog-id=205 op=LOAD Feb 12 19:21:54.886000 audit[5835]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=2589 pid=5835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.886000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6164643063386630383461303563343762373362326237396133353265 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.970000 audit: BPF prog-id=206 op=LOAD Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2202 pid=5858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433646661323062353463656134616132356634383033356139613337 Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2202 pid=5858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433646661323062353463656134616132356634383033356139613337 Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.971000 audit[5858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2202 pid=5858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.971000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433646661323062353463656134616132356634383033356139613337 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit: BPF prog-id=208 op=LOAD Feb 12 19:21:54.974000 audit[5858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2202 pid=5858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433646661323062353463656134616132356634383033356139613337 Feb 12 19:21:54.974000 audit: BPF prog-id=208 op=UNLOAD Feb 12 19:21:54.974000 audit: BPF prog-id=207 op=UNLOAD Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { perfmon } for pid=5858 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit[5858]: AVC avc: denied { bpf } for pid=5858 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:54.974000 audit: BPF prog-id=209 op=LOAD Feb 12 19:21:54.974000 audit[5858]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2202 pid=5858 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:54.974000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6433646661323062353463656134616132356634383033356139613337 Feb 12 19:21:54.994983 env[1346]: time="2024-02-12T19:21:54.994933465Z" level=info msg="StartContainer for \"add0c8f084a05c47b73b2b79a352eec28288ff0b8d385dd337b149a20687a213\" returns successfully" Feb 12 19:21:55.010376 env[1346]: time="2024-02-12T19:21:55.010329409Z" level=info msg="StartContainer for \"d3dfa20b54cea4aa25f48035a9a373b4c8a1bc0f3b58dbc5d8b2255b8ab2cf28\" returns successfully" Feb 12 19:21:55.124670 kubelet[2463]: E0212 19:21:55.124640 2463 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:34330->10.200.20.21:2379: read: connection timed out" Feb 12 19:21:55.129438 systemd[1]: cri-containerd-47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068.scope: Deactivated successfully. Feb 12 19:21:55.129746 systemd[1]: cri-containerd-47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068.scope: Consumed 2.586s CPU time. Feb 12 19:21:55.133000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:21:55.133000 audit: BPF prog-id=108 op=UNLOAD Feb 12 19:21:55.154751 env[1346]: time="2024-02-12T19:21:55.154686149Z" level=info msg="shim disconnected" id=47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068 Feb 12 19:21:55.154889 env[1346]: time="2024-02-12T19:21:55.154778150Z" level=warning msg="cleaning up after shim disconnected" id=47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068 namespace=k8s.io Feb 12 19:21:55.154889 env[1346]: time="2024-02-12T19:21:55.154790430Z" level=info msg="cleaning up dead shim" Feb 12 19:21:55.163591 env[1346]: time="2024-02-12T19:21:55.163479951Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:21:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5908 runtime=io.containerd.runc.v2\n" Feb 12 19:21:55.318576 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2041979915.mount: Deactivated successfully. Feb 12 19:21:55.318687 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068-rootfs.mount: Deactivated successfully. Feb 12 19:21:55.757042 kubelet[2463]: I0212 19:21:55.757013 2463 scope.go:115] "RemoveContainer" containerID="47015414055f89a66d392ebb1fbeb057bf24cf3a4b1999d59f8f972642240068" Feb 12 19:21:55.759150 env[1346]: time="2024-02-12T19:21:55.759097843Z" level=info msg="CreateContainer within sandbox \"65ef1bfee62887a1623e8be1d4128465a0f824c93e12d7bf09b5c3ca285e5c54\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 12 19:21:55.812946 env[1346]: time="2024-02-12T19:21:55.812893343Z" level=info msg="CreateContainer within sandbox \"65ef1bfee62887a1623e8be1d4128465a0f824c93e12d7bf09b5c3ca285e5c54\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"ea400a44be0fd6c5f0987848a25c898394de0e41ad26b1837b04b4b1c115f291\"" Feb 12 19:21:55.813340 env[1346]: time="2024-02-12T19:21:55.813314786Z" level=info msg="StartContainer for \"ea400a44be0fd6c5f0987848a25c898394de0e41ad26b1837b04b4b1c115f291\"" Feb 12 19:21:55.837657 systemd[1]: Started cri-containerd-ea400a44be0fd6c5f0987848a25c898394de0e41ad26b1837b04b4b1c115f291.scope. Feb 12 19:21:55.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.847000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.847000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit: BPF prog-id=210 op=LOAD Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2182 pid=5926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:55.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561343030613434626530666436633566303938373834386132356338 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2182 pid=5926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:55.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561343030613434626530666436633566303938373834386132356338 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit: BPF prog-id=211 op=LOAD Feb 12 19:21:55.848000 audit[5926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2182 pid=5926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:55.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561343030613434626530666436633566303938373834386132356338 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.848000 audit: BPF prog-id=212 op=LOAD Feb 12 19:21:55.848000 audit[5926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2182 pid=5926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:55.848000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561343030613434626530666436633566303938373834386132356338 Feb 12 19:21:55.849000 audit: BPF prog-id=212 op=UNLOAD Feb 12 19:21:55.849000 audit: BPF prog-id=211 op=UNLOAD Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { perfmon } for pid=5926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit[5926]: AVC avc: denied { bpf } for pid=5926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:21:55.849000 audit: BPF prog-id=213 op=LOAD Feb 12 19:21:55.849000 audit[5926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2182 pid=5926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:21:55.849000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6561343030613434626530666436633566303938373834386132356338 Feb 12 19:21:55.877943 env[1346]: time="2024-02-12T19:21:55.877891666Z" level=info msg="StartContainer for \"ea400a44be0fd6c5f0987848a25c898394de0e41ad26b1837b04b4b1c115f291\" returns successfully" Feb 12 19:21:56.577000 audit[5868]: AVC avc: denied { watch } for pid=5868 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:56.577000 audit[5868]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000051f50 a2=fc6 a3=0 items=0 ppid=2202 pid=5868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:56.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:56.578000 audit[5868]: AVC avc: denied { watch } for pid=5868 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:21:56.578000 audit[5868]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40000526a0 a2=fc6 a3=0 items=0 ppid=2202 pid=5868 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c492,c991 key=(null) Feb 12 19:21:56.578000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:21:58.449939 kubelet[2463]: E0212 19:21:58.449833 2463 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-d216911d7c.17b333dd0137be90", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-d216911d7c", UID:"05c3a2772c7ac5aada9716666f9dfc77", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-d216911d7c"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 21, 48, 4769424, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 21, 48, 4769424, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"", ReportingInstance:""}': 'rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:34162->10.200.20.21:2379: read: connection timed out' (will not retry!) Feb 12 19:22:04.465606 kubelet[2463]: I0212 19:22:04.465563 2463 status_manager.go:809] "Failed to get status for pod" podUID=05c3a2772c7ac5aada9716666f9dfc77 pod="kube-system/kube-apiserver-ci-3510.3.2-a-d216911d7c" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.38:34252->10.200.20.21:2379: read: connection timed out" Feb 12 19:22:05.125177 kubelet[2463]: E0212 19:22:05.125138 2463 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-d216911d7c?timeout=10s\": context deadline exceeded (Client.Timeout exceeded while awaiting headers)" Feb 12 19:22:06.836714 systemd[1]: cri-containerd-add0c8f084a05c47b73b2b79a352eec28288ff0b8d385dd337b149a20687a213.scope: Deactivated successfully. Feb 12 19:22:06.835000 audit: BPF prog-id=202 op=UNLOAD Feb 12 19:22:06.842921 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 12 19:22:06.843005 kernel: audit: type=1334 audit(1707765726.835:1708): prog-id=202 op=UNLOAD Feb 12 19:22:06.850000 audit: BPF prog-id=205 op=UNLOAD Feb 12 19:22:06.862783 kernel: audit: type=1334 audit(1707765726.850:1709): prog-id=205 op=UNLOAD Feb 12 19:22:06.875174 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-add0c8f084a05c47b73b2b79a352eec28288ff0b8d385dd337b149a20687a213-rootfs.mount: Deactivated successfully. Feb 12 19:22:06.931908 env[1346]: time="2024-02-12T19:22:06.931848856Z" level=info msg="shim disconnected" id=add0c8f084a05c47b73b2b79a352eec28288ff0b8d385dd337b149a20687a213 Feb 12 19:22:06.931908 env[1346]: time="2024-02-12T19:22:06.931899297Z" level=warning msg="cleaning up after shim disconnected" id=add0c8f084a05c47b73b2b79a352eec28288ff0b8d385dd337b149a20687a213 namespace=k8s.io Feb 12 19:22:06.931908 env[1346]: time="2024-02-12T19:22:06.931911777Z" level=info msg="cleaning up dead shim" Feb 12 19:22:06.939809 env[1346]: time="2024-02-12T19:22:06.939764800Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:22:06Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5989 runtime=io.containerd.runc.v2\n" Feb 12 19:22:07.786981 kubelet[2463]: I0212 19:22:07.786376 2463 scope.go:115] "RemoveContainer" containerID="a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f" Feb 12 19:22:07.786981 kubelet[2463]: I0212 19:22:07.786674 2463 scope.go:115] "RemoveContainer" containerID="add0c8f084a05c47b73b2b79a352eec28288ff0b8d385dd337b149a20687a213" Feb 12 19:22:07.786981 kubelet[2463]: E0212 19:22:07.786944 2463 pod_workers.go:1294] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-7ff8dc855-ltchf_tigera-operator(452d2214-f40b-4306-9440-07c6dc76096b)\"" pod="tigera-operator/tigera-operator-7ff8dc855-ltchf" podUID=452d2214-f40b-4306-9440-07c6dc76096b Feb 12 19:22:07.787911 env[1346]: time="2024-02-12T19:22:07.787877922Z" level=info msg="RemoveContainer for \"a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f\"" Feb 12 19:22:07.800687 env[1346]: time="2024-02-12T19:22:07.800651504Z" level=info msg="RemoveContainer for \"a672a1d22191b3cf12a0f0167c2b3a973a9009c10d4de419a0ff56a686077a0f\" returns successfully" Feb 12 19:22:15.125359 kubelet[2463]: E0212 19:22:15.125315 2463 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.38:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-d216911d7c?timeout=10s\": context deadline exceeded" Feb 12 19:22:18.476006 systemd[1]: run-containerd-runc-k8s.io-baa4251a595a70fd2d0ddc67d69e378706c75044565b0f4981f4ad51551ca64c-runc.OABzww.mount: Deactivated successfully. Feb 12 19:22:19.145000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.145000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.196184 kernel: audit: type=1400 audit(1707765739.145:1710): avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.196322 kernel: audit: type=1400 audit(1707765739.145:1711): avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=521004 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.145000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5a a1=400848f770 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:22:19.226866 kernel: audit: type=1300 audit(1707765739.145:1711): arch=c00000b7 syscall=27 success=no exit=-13 a0=5a a1=400848f770 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:22:19.145000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:22:19.253535 kernel: audit: type=1327 audit(1707765739.145:1711): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:22:19.145000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=40083c1a70 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:22:19.284562 kernel: audit: type=1300 audit(1707765739.145:1710): arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=40083c1a70 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:22:19.284758 kernel: audit: type=1327 audit(1707765739.145:1710): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:22:19.145000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:22:19.183000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.336170 kernel: audit: type=1400 audit(1707765739.183:1712): avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.183000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=400961bc60 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:22:19.366941 kernel: audit: type=1300 audit(1707765739.183:1712): arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=400961bc60 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:22:19.367071 kernel: audit: type=1327 audit(1707765739.183:1712): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:22:19.183000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:22:19.184000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.420456 kernel: audit: type=1400 audit(1707765739.184:1713): avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521010 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.184000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=40083c1bc0 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:22:19.184000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:22:19.190000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520993 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.190000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=4009a7bb80 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:22:19.190000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:22:19.190000 audit[2295]: AVC avc: denied { watch } for pid=2295 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521008 scontext=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:22:19.190000 audit[2295]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4f a1=400848fc20 a2=fc6 a3=0 items=0 ppid=2147 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c570,c963 key=(null) Feb 12 19:22:19.190000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3338002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562