Feb 12 19:35:44.020490 kernel: Booting Linux on physical CPU 0x0000000000 [0x413fd0c1] Feb 12 19:35:44.020508 kernel: Linux version 5.15.148-flatcar (build@pony-truck.infra.kinvolk.io) (aarch64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP PREEMPT Mon Feb 12 18:07:00 -00 2024 Feb 12 19:35:44.020515 kernel: earlycon: pl11 at MMIO 0x00000000effec000 (options '') Feb 12 19:35:44.020523 kernel: printk: bootconsole [pl11] enabled Feb 12 19:35:44.020528 kernel: efi: EFI v2.70 by EDK II Feb 12 19:35:44.020533 kernel: efi: ACPI 2.0=0x3fd89018 SMBIOS=0x3fd66000 SMBIOS 3.0=0x3fd64000 MEMATTR=0x3ef2e698 RNG=0x3fd89998 MEMRESERVE=0x37e73f98 Feb 12 19:35:44.020539 kernel: random: crng init done Feb 12 19:35:44.020545 kernel: ACPI: Early table checksum verification disabled Feb 12 19:35:44.020550 kernel: ACPI: RSDP 0x000000003FD89018 000024 (v02 VRTUAL) Feb 12 19:35:44.020555 kernel: ACPI: XSDT 0x000000003FD89F18 00006C (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:35:44.020561 kernel: ACPI: FACP 0x000000003FD89C18 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:35:44.020567 kernel: ACPI: DSDT 0x000000003EBD2018 01DEC0 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Feb 12 19:35:44.020573 kernel: ACPI: DBG2 0x000000003FD89B18 000072 (v00 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:35:44.020579 kernel: ACPI: GTDT 0x000000003FD89D98 000060 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:35:44.020585 kernel: ACPI: OEM0 0x000000003FD89098 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:35:44.020591 kernel: ACPI: SPCR 0x000000003FD89A98 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:35:44.020597 kernel: ACPI: APIC 0x000000003FD89818 0000FC (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:35:44.020604 kernel: ACPI: SRAT 0x000000003FD89198 000234 (v03 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:35:44.020610 kernel: ACPI: PPTT 0x000000003FD89418 000120 (v01 VRTUAL MICROSFT 00000000 MSFT 00000000) Feb 12 19:35:44.020616 kernel: ACPI: BGRT 0x000000003FD89E98 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Feb 12 19:35:44.020622 kernel: ACPI: SPCR: console: pl011,mmio32,0xeffec000,115200 Feb 12 19:35:44.020627 kernel: NUMA: Failed to initialise from firmware Feb 12 19:35:44.020633 kernel: NUMA: Faking a node at [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:35:44.020639 kernel: NUMA: NODE_DATA [mem 0x1bf7f2900-0x1bf7f7fff] Feb 12 19:35:44.020645 kernel: Zone ranges: Feb 12 19:35:44.020651 kernel: DMA [mem 0x0000000000000000-0x00000000ffffffff] Feb 12 19:35:44.020656 kernel: DMA32 empty Feb 12 19:35:44.020663 kernel: Normal [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:35:44.020669 kernel: Movable zone start for each node Feb 12 19:35:44.020674 kernel: Early memory node ranges Feb 12 19:35:44.020680 kernel: node 0: [mem 0x0000000000000000-0x00000000007fffff] Feb 12 19:35:44.020686 kernel: node 0: [mem 0x0000000000824000-0x000000003ec80fff] Feb 12 19:35:44.020691 kernel: node 0: [mem 0x000000003ec81000-0x000000003eca9fff] Feb 12 19:35:44.020697 kernel: node 0: [mem 0x000000003ecaa000-0x000000003fd29fff] Feb 12 19:35:44.020703 kernel: node 0: [mem 0x000000003fd2a000-0x000000003fd7dfff] Feb 12 19:35:44.020708 kernel: node 0: [mem 0x000000003fd7e000-0x000000003fd89fff] Feb 12 19:35:44.020714 kernel: node 0: [mem 0x000000003fd8a000-0x000000003fd8dfff] Feb 12 19:35:44.020719 kernel: node 0: [mem 0x000000003fd8e000-0x000000003fffffff] Feb 12 19:35:44.020725 kernel: node 0: [mem 0x0000000100000000-0x00000001bfffffff] Feb 12 19:35:44.020732 kernel: Initmem setup node 0 [mem 0x0000000000000000-0x00000001bfffffff] Feb 12 19:35:44.020740 kernel: On node 0, zone DMA: 36 pages in unavailable ranges Feb 12 19:35:44.020746 kernel: psci: probing for conduit method from ACPI. Feb 12 19:35:44.020752 kernel: psci: PSCIv1.1 detected in firmware. Feb 12 19:35:44.020758 kernel: psci: Using standard PSCI v0.2 function IDs Feb 12 19:35:44.020765 kernel: psci: MIGRATE_INFO_TYPE not supported. Feb 12 19:35:44.020771 kernel: psci: SMC Calling Convention v1.4 Feb 12 19:35:44.020777 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x0 -> Node -1 Feb 12 19:35:44.020783 kernel: ACPI: NUMA: SRAT: PXM 0 -> MPIDR 0x1 -> Node -1 Feb 12 19:35:44.020789 kernel: percpu: Embedded 29 pages/cpu s79960 r8192 d30632 u118784 Feb 12 19:35:44.020795 kernel: pcpu-alloc: s79960 r8192 d30632 u118784 alloc=29*4096 Feb 12 19:35:44.020801 kernel: pcpu-alloc: [0] 0 [0] 1 Feb 12 19:35:44.020807 kernel: Detected PIPT I-cache on CPU0 Feb 12 19:35:44.020813 kernel: CPU features: detected: GIC system register CPU interface Feb 12 19:35:44.020819 kernel: CPU features: detected: Hardware dirty bit management Feb 12 19:35:44.020825 kernel: CPU features: detected: Spectre-BHB Feb 12 19:35:44.020831 kernel: CPU features: kernel page table isolation forced ON by KASLR Feb 12 19:35:44.020838 kernel: CPU features: detected: Kernel page table isolation (KPTI) Feb 12 19:35:44.020844 kernel: CPU features: detected: ARM erratum 1418040 Feb 12 19:35:44.020850 kernel: CPU features: detected: ARM erratum 1542419 (kernel portion) Feb 12 19:35:44.020856 kernel: Built 1 zonelists, mobility grouping on. Total pages: 1032156 Feb 12 19:35:44.020862 kernel: Policy zone: Normal Feb 12 19:35:44.020870 kernel: Kernel command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:35:44.020876 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Feb 12 19:35:44.020883 kernel: Dentry cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Feb 12 19:35:44.020889 kernel: Inode-cache hash table entries: 262144 (order: 9, 2097152 bytes, linear) Feb 12 19:35:44.020895 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Feb 12 19:35:44.020903 kernel: software IO TLB: mapped [mem 0x000000003abd2000-0x000000003ebd2000] (64MB) Feb 12 19:35:44.020909 kernel: Memory: 3991936K/4194160K available (9792K kernel code, 2092K rwdata, 7556K rodata, 34688K init, 778K bss, 202224K reserved, 0K cma-reserved) Feb 12 19:35:44.020915 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Feb 12 19:35:44.020921 kernel: trace event string verifier disabled Feb 12 19:35:44.020927 kernel: rcu: Preemptible hierarchical RCU implementation. Feb 12 19:35:44.020933 kernel: rcu: RCU event tracing is enabled. Feb 12 19:35:44.020939 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Feb 12 19:35:44.020945 kernel: Trampoline variant of Tasks RCU enabled. Feb 12 19:35:44.020951 kernel: Tracing variant of Tasks RCU enabled. Feb 12 19:35:44.020958 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Feb 12 19:35:44.020964 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Feb 12 19:35:44.020971 kernel: NR_IRQS: 64, nr_irqs: 64, preallocated irqs: 0 Feb 12 19:35:44.020977 kernel: GICv3: 960 SPIs implemented Feb 12 19:35:44.020983 kernel: GICv3: 0 Extended SPIs implemented Feb 12 19:35:44.020989 kernel: GICv3: Distributor has no Range Selector support Feb 12 19:35:44.020994 kernel: Root IRQ handler: gic_handle_irq Feb 12 19:35:44.021000 kernel: GICv3: 16 PPIs implemented Feb 12 19:35:44.021006 kernel: GICv3: CPU0: found redistributor 0 region 0:0x00000000effee000 Feb 12 19:35:44.021012 kernel: ITS: No ITS available, not enabling LPIs Feb 12 19:35:44.021019 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:35:44.021026 kernel: arch_timer: cp15 timer(s) running at 25.00MHz (virt). Feb 12 19:35:44.021033 kernel: clocksource: arch_sys_counter: mask: 0xffffffffffffff max_cycles: 0x5c40939b5, max_idle_ns: 440795202646 ns Feb 12 19:35:44.021041 kernel: sched_clock: 56 bits at 25MHz, resolution 40ns, wraps every 4398046511100ns Feb 12 19:35:44.021050 kernel: Console: colour dummy device 80x25 Feb 12 19:35:44.021058 kernel: printk: console [tty1] enabled Feb 12 19:35:44.021065 kernel: ACPI: Core revision 20210730 Feb 12 19:35:44.021073 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 50.00 BogoMIPS (lpj=25000) Feb 12 19:35:44.021080 kernel: pid_max: default: 32768 minimum: 301 Feb 12 19:35:44.021087 kernel: LSM: Security Framework initializing Feb 12 19:35:44.021095 kernel: SELinux: Initializing. Feb 12 19:35:44.021102 kernel: Mount-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:35:44.021109 kernel: Mountpoint-cache hash table entries: 8192 (order: 4, 65536 bytes, linear) Feb 12 19:35:44.021118 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3a8030, hints 0xe, misc 0x31e1 Feb 12 19:35:44.021125 kernel: Hyper-V: Host Build 10.0.22477.1369-1-0 Feb 12 19:35:44.021132 kernel: rcu: Hierarchical SRCU implementation. Feb 12 19:35:44.021159 kernel: Remapping and enabling EFI services. Feb 12 19:35:44.021167 kernel: smp: Bringing up secondary CPUs ... Feb 12 19:35:44.021175 kernel: Detected PIPT I-cache on CPU1 Feb 12 19:35:44.021182 kernel: GICv3: CPU1: found redistributor 1 region 1:0x00000000f000e000 Feb 12 19:35:44.021188 kernel: arch_timer: Enabling local workaround for ARM erratum 1418040 Feb 12 19:35:44.021194 kernel: CPU1: Booted secondary processor 0x0000000001 [0x413fd0c1] Feb 12 19:35:44.021203 kernel: smp: Brought up 1 node, 2 CPUs Feb 12 19:35:44.021210 kernel: SMP: Total of 2 processors activated. Feb 12 19:35:44.021218 kernel: CPU features: detected: 32-bit EL0 Support Feb 12 19:35:44.021226 kernel: CPU features: detected: Instruction cache invalidation not required for I/D coherence Feb 12 19:35:44.021233 kernel: CPU features: detected: Data cache clean to the PoU not required for I/D coherence Feb 12 19:35:44.021240 kernel: CPU features: detected: CRC32 instructions Feb 12 19:35:44.021247 kernel: CPU features: detected: RCpc load-acquire (LDAPR) Feb 12 19:35:44.021255 kernel: CPU features: detected: LSE atomic instructions Feb 12 19:35:44.021262 kernel: CPU features: detected: Privileged Access Never Feb 12 19:35:44.021271 kernel: CPU: All CPU(s) started at EL1 Feb 12 19:35:44.021278 kernel: alternatives: patching kernel code Feb 12 19:35:44.021291 kernel: devtmpfs: initialized Feb 12 19:35:44.021299 kernel: KASLR enabled Feb 12 19:35:44.021306 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Feb 12 19:35:44.021313 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Feb 12 19:35:44.021319 kernel: pinctrl core: initialized pinctrl subsystem Feb 12 19:35:44.021325 kernel: SMBIOS 3.1.0 present. Feb 12 19:35:44.021332 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 07/12/2023 Feb 12 19:35:44.021339 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Feb 12 19:35:44.021347 kernel: DMA: preallocated 512 KiB GFP_KERNEL pool for atomic allocations Feb 12 19:35:44.021353 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA pool for atomic allocations Feb 12 19:35:44.021360 kernel: DMA: preallocated 512 KiB GFP_KERNEL|GFP_DMA32 pool for atomic allocations Feb 12 19:35:44.021367 kernel: audit: initializing netlink subsys (disabled) Feb 12 19:35:44.021373 kernel: audit: type=2000 audit(0.086:1): state=initialized audit_enabled=0 res=1 Feb 12 19:35:44.021380 kernel: thermal_sys: Registered thermal governor 'step_wise' Feb 12 19:35:44.021386 kernel: cpuidle: using governor menu Feb 12 19:35:44.021394 kernel: hw-breakpoint: found 6 breakpoint and 4 watchpoint registers. Feb 12 19:35:44.021401 kernel: ASID allocator initialised with 32768 entries Feb 12 19:35:44.021408 kernel: ACPI: bus type PCI registered Feb 12 19:35:44.021414 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Feb 12 19:35:44.021421 kernel: Serial: AMBA PL011 UART driver Feb 12 19:35:44.021428 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Feb 12 19:35:44.021434 kernel: HugeTLB registered 32.0 MiB page size, pre-allocated 0 pages Feb 12 19:35:44.021441 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Feb 12 19:35:44.021447 kernel: HugeTLB registered 64.0 KiB page size, pre-allocated 0 pages Feb 12 19:35:44.021455 kernel: cryptd: max_cpu_qlen set to 1000 Feb 12 19:35:44.021462 kernel: alg: No test for fips(ansi_cprng) (fips_ansi_cprng) Feb 12 19:35:44.021469 kernel: ACPI: Added _OSI(Module Device) Feb 12 19:35:44.021475 kernel: ACPI: Added _OSI(Processor Device) Feb 12 19:35:44.021482 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Feb 12 19:35:44.021488 kernel: ACPI: Added _OSI(Processor Aggregator Device) Feb 12 19:35:44.021495 kernel: ACPI: Added _OSI(Linux-Dell-Video) Feb 12 19:35:44.021501 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Feb 12 19:35:44.021508 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Feb 12 19:35:44.021515 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Feb 12 19:35:44.021522 kernel: ACPI: Interpreter enabled Feb 12 19:35:44.021528 kernel: ACPI: Using GIC for interrupt routing Feb 12 19:35:44.021535 kernel: ARMH0011:00: ttyAMA0 at MMIO 0xeffec000 (irq = 12, base_baud = 0) is a SBSA Feb 12 19:35:44.021542 kernel: printk: console [ttyAMA0] enabled Feb 12 19:35:44.021549 kernel: printk: bootconsole [pl11] disabled Feb 12 19:35:44.021555 kernel: ARMH0011:01: ttyAMA1 at MMIO 0xeffeb000 (irq = 13, base_baud = 0) is a SBSA Feb 12 19:35:44.021562 kernel: iommu: Default domain type: Translated Feb 12 19:35:44.021568 kernel: iommu: DMA domain TLB invalidation policy: strict mode Feb 12 19:35:44.021576 kernel: vgaarb: loaded Feb 12 19:35:44.021583 kernel: pps_core: LinuxPPS API ver. 1 registered Feb 12 19:35:44.021589 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Feb 12 19:35:44.021596 kernel: PTP clock support registered Feb 12 19:35:44.021603 kernel: Registered efivars operations Feb 12 19:35:44.021609 kernel: No ACPI PMU IRQ for CPU0 Feb 12 19:35:44.021615 kernel: No ACPI PMU IRQ for CPU1 Feb 12 19:35:44.021622 kernel: clocksource: Switched to clocksource arch_sys_counter Feb 12 19:35:44.021628 kernel: VFS: Disk quotas dquot_6.6.0 Feb 12 19:35:44.021636 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Feb 12 19:35:44.021643 kernel: pnp: PnP ACPI init Feb 12 19:35:44.021649 kernel: pnp: PnP ACPI: found 0 devices Feb 12 19:35:44.021656 kernel: NET: Registered PF_INET protocol family Feb 12 19:35:44.021662 kernel: IP idents hash table entries: 65536 (order: 7, 524288 bytes, linear) Feb 12 19:35:44.021669 kernel: tcp_listen_portaddr_hash hash table entries: 2048 (order: 3, 32768 bytes, linear) Feb 12 19:35:44.021675 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Feb 12 19:35:44.021682 kernel: TCP established hash table entries: 32768 (order: 6, 262144 bytes, linear) Feb 12 19:35:44.021689 kernel: TCP bind hash table entries: 32768 (order: 7, 524288 bytes, linear) Feb 12 19:35:44.021696 kernel: TCP: Hash tables configured (established 32768 bind 32768) Feb 12 19:35:44.021703 kernel: UDP hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:35:44.021710 kernel: UDP-Lite hash table entries: 2048 (order: 4, 65536 bytes, linear) Feb 12 19:35:44.021716 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Feb 12 19:35:44.021723 kernel: PCI: CLS 0 bytes, default 64 Feb 12 19:35:44.021729 kernel: hw perfevents: enabled with armv8_pmuv3_0 PMU driver, 1 counters available Feb 12 19:35:44.021736 kernel: kvm [1]: HYP mode not available Feb 12 19:35:44.021742 kernel: Initialise system trusted keyrings Feb 12 19:35:44.021749 kernel: workingset: timestamp_bits=39 max_order=20 bucket_order=0 Feb 12 19:35:44.021756 kernel: Key type asymmetric registered Feb 12 19:35:44.021763 kernel: Asymmetric key parser 'x509' registered Feb 12 19:35:44.021769 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Feb 12 19:35:44.021776 kernel: io scheduler mq-deadline registered Feb 12 19:35:44.021783 kernel: io scheduler kyber registered Feb 12 19:35:44.021789 kernel: io scheduler bfq registered Feb 12 19:35:44.021796 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Feb 12 19:35:44.021802 kernel: thunder_xcv, ver 1.0 Feb 12 19:35:44.021808 kernel: thunder_bgx, ver 1.0 Feb 12 19:35:44.021817 kernel: nicpf, ver 1.0 Feb 12 19:35:44.021823 kernel: nicvf, ver 1.0 Feb 12 19:35:44.021943 kernel: rtc-efi rtc-efi.0: registered as rtc0 Feb 12 19:35:44.022005 kernel: rtc-efi rtc-efi.0: setting system clock to 2024-02-12T19:35:43 UTC (1707766543) Feb 12 19:35:44.022014 kernel: efifb: probing for efifb Feb 12 19:35:44.022021 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Feb 12 19:35:44.022028 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Feb 12 19:35:44.022035 kernel: efifb: scrolling: redraw Feb 12 19:35:44.022043 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Feb 12 19:35:44.022050 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:35:44.022056 kernel: fb0: EFI VGA frame buffer device Feb 12 19:35:44.022063 kernel: SMCCC: SOC_ID: ARCH_SOC_ID not implemented, skipping .... Feb 12 19:35:44.022069 kernel: hid: raw HID events driver (C) Jiri Kosina Feb 12 19:35:44.022085 kernel: NET: Registered PF_INET6 protocol family Feb 12 19:35:44.022092 kernel: Segment Routing with IPv6 Feb 12 19:35:44.022098 kernel: In-situ OAM (IOAM) with IPv6 Feb 12 19:35:44.022105 kernel: NET: Registered PF_PACKET protocol family Feb 12 19:35:44.022113 kernel: Key type dns_resolver registered Feb 12 19:35:44.022120 kernel: registered taskstats version 1 Feb 12 19:35:44.022126 kernel: Loading compiled-in X.509 certificates Feb 12 19:35:44.022133 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.148-flatcar: c8c3faa6fd8ae0112832fff0e3d0e58448a7eb6c' Feb 12 19:35:44.023168 kernel: Key type .fscrypt registered Feb 12 19:35:44.023178 kernel: Key type fscrypt-provisioning registered Feb 12 19:35:44.023185 kernel: ima: No TPM chip found, activating TPM-bypass! Feb 12 19:35:44.023192 kernel: ima: Allocated hash algorithm: sha1 Feb 12 19:35:44.023199 kernel: ima: No architecture policies found Feb 12 19:35:44.023209 kernel: Freeing unused kernel memory: 34688K Feb 12 19:35:44.023215 kernel: Run /init as init process Feb 12 19:35:44.023222 kernel: with arguments: Feb 12 19:35:44.023229 kernel: /init Feb 12 19:35:44.023235 kernel: with environment: Feb 12 19:35:44.023241 kernel: HOME=/ Feb 12 19:35:44.023248 kernel: TERM=linux Feb 12 19:35:44.023254 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Feb 12 19:35:44.023264 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:35:44.023274 systemd[1]: Detected virtualization microsoft. Feb 12 19:35:44.023281 systemd[1]: Detected architecture arm64. Feb 12 19:35:44.023288 systemd[1]: Running in initrd. Feb 12 19:35:44.023295 systemd[1]: No hostname configured, using default hostname. Feb 12 19:35:44.023302 systemd[1]: Hostname set to . Feb 12 19:35:44.023310 systemd[1]: Initializing machine ID from random generator. Feb 12 19:35:44.023317 systemd[1]: Queued start job for default target initrd.target. Feb 12 19:35:44.023325 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:35:44.023332 systemd[1]: Reached target cryptsetup.target. Feb 12 19:35:44.023339 systemd[1]: Reached target paths.target. Feb 12 19:35:44.023346 systemd[1]: Reached target slices.target. Feb 12 19:35:44.023353 systemd[1]: Reached target swap.target. Feb 12 19:35:44.023360 systemd[1]: Reached target timers.target. Feb 12 19:35:44.023367 systemd[1]: Listening on iscsid.socket. Feb 12 19:35:44.023374 systemd[1]: Listening on iscsiuio.socket. Feb 12 19:35:44.023383 systemd[1]: Listening on systemd-journald-audit.socket. Feb 12 19:35:44.023390 systemd[1]: Listening on systemd-journald-dev-log.socket. Feb 12 19:35:44.023397 systemd[1]: Listening on systemd-journald.socket. Feb 12 19:35:44.023405 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:35:44.023412 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:35:44.023419 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:35:44.023426 systemd[1]: Reached target sockets.target. Feb 12 19:35:44.023433 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:35:44.023440 systemd[1]: Finished network-cleanup.service. Feb 12 19:35:44.023449 systemd[1]: Starting systemd-fsck-usr.service... Feb 12 19:35:44.023456 systemd[1]: Starting systemd-journald.service... Feb 12 19:35:44.023463 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:35:44.023470 systemd[1]: Starting systemd-resolved.service... Feb 12 19:35:44.023480 systemd-journald[276]: Journal started Feb 12 19:35:44.023523 systemd-journald[276]: Runtime Journal (/run/log/journal/f59ebd12b3234f028401e43f4909a058) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:35:44.006387 systemd-modules-load[277]: Inserted module 'overlay' Feb 12 19:35:44.049156 systemd[1]: Starting systemd-vconsole-setup.service... Feb 12 19:35:44.049202 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Feb 12 19:35:44.058627 systemd-modules-load[277]: Inserted module 'br_netfilter' Feb 12 19:35:44.063366 systemd[1]: Started systemd-journald.service. Feb 12 19:35:44.063386 kernel: Bridge firewalling registered Feb 12 19:35:44.059562 systemd-resolved[278]: Positive Trust Anchors: Feb 12 19:35:44.059569 systemd-resolved[278]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:35:44.059596 systemd-resolved[278]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:35:44.088000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.061635 systemd-resolved[278]: Defaulting to hostname 'linux'. Feb 12 19:35:44.140907 kernel: SCSI subsystem initialized Feb 12 19:35:44.140926 kernel: audit: type=1130 audit(1707766544.088:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.141426 systemd[1]: Started systemd-resolved.service. Feb 12 19:35:44.156625 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:35:44.172537 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Feb 12 19:35:44.172558 kernel: device-mapper: uevent: version 1.0.3 Feb 12 19:35:44.164992 systemd[1]: Finished systemd-fsck-usr.service. Feb 12 19:35:44.188530 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Feb 12 19:35:44.184817 systemd[1]: Finished systemd-vconsole-setup.service. Feb 12 19:35:44.195432 systemd-modules-load[277]: Inserted module 'dm_multipath' Feb 12 19:35:44.156000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.196107 systemd[1]: Reached target nss-lookup.target. Feb 12 19:35:44.275294 kernel: audit: type=1130 audit(1707766544.156:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.275321 kernel: audit: type=1130 audit(1707766544.164:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.275331 kernel: audit: type=1130 audit(1707766544.184:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.275339 kernel: audit: type=1130 audit(1707766544.195:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.164000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.184000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.224048 systemd[1]: Starting dracut-cmdline-ask.service... Feb 12 19:35:44.291000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.280717 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Feb 12 19:35:44.285542 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:35:44.326089 kernel: audit: type=1130 audit(1707766544.291:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.310379 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:35:44.328931 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Feb 12 19:35:44.360339 kernel: audit: type=1130 audit(1707766544.336:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.336000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.336666 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:35:44.360745 systemd[1]: Finished dracut-cmdline-ask.service. Feb 12 19:35:44.360000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.385000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.390638 systemd[1]: Starting dracut-cmdline.service... Feb 12 19:35:44.416228 kernel: audit: type=1130 audit(1707766544.360:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.416251 kernel: audit: type=1130 audit(1707766544.385:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.420963 dracut-cmdline[299]: dracut-dracut-053 Feb 12 19:35:44.425830 dracut-cmdline[299]: Using kernel command line parameters: rd.driver.pre=btrfs BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyAMA0,115200n8 earlycon=pl011,0xeffec000 flatcar.first_boot=detected acpi=force flatcar.oem.id=azure flatcar.autologin verity.usrhash=0a07ee1673be713cb46dc1305004c8854c4690dc8835a87e3bc71aa6c6a62e40 Feb 12 19:35:44.517166 kernel: Loading iSCSI transport class v2.0-870. Feb 12 19:35:44.528163 kernel: iscsi: registered transport (tcp) Feb 12 19:35:44.547184 kernel: iscsi: registered transport (qla4xxx) Feb 12 19:35:44.547206 kernel: QLogic iSCSI HBA Driver Feb 12 19:35:44.581579 systemd[1]: Finished dracut-cmdline.service. Feb 12 19:35:44.585000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:44.587078 systemd[1]: Starting dracut-pre-udev.service... Feb 12 19:35:44.639159 kernel: raid6: neonx8 gen() 13766 MB/s Feb 12 19:35:44.659148 kernel: raid6: neonx8 xor() 10828 MB/s Feb 12 19:35:44.679148 kernel: raid6: neonx4 gen() 13542 MB/s Feb 12 19:35:44.700148 kernel: raid6: neonx4 xor() 11315 MB/s Feb 12 19:35:44.720150 kernel: raid6: neonx2 gen() 12928 MB/s Feb 12 19:35:44.740147 kernel: raid6: neonx2 xor() 10385 MB/s Feb 12 19:35:44.761148 kernel: raid6: neonx1 gen() 10491 MB/s Feb 12 19:35:44.781147 kernel: raid6: neonx1 xor() 8780 MB/s Feb 12 19:35:44.801147 kernel: raid6: int64x8 gen() 6297 MB/s Feb 12 19:35:44.822148 kernel: raid6: int64x8 xor() 3547 MB/s Feb 12 19:35:44.842147 kernel: raid6: int64x4 gen() 7246 MB/s Feb 12 19:35:44.862147 kernel: raid6: int64x4 xor() 3858 MB/s Feb 12 19:35:44.883151 kernel: raid6: int64x2 gen() 6153 MB/s Feb 12 19:35:44.903147 kernel: raid6: int64x2 xor() 3324 MB/s Feb 12 19:35:44.923166 kernel: raid6: int64x1 gen() 5044 MB/s Feb 12 19:35:44.948155 kernel: raid6: int64x1 xor() 2646 MB/s Feb 12 19:35:44.948171 kernel: raid6: using algorithm neonx8 gen() 13766 MB/s Feb 12 19:35:44.948180 kernel: raid6: .... xor() 10828 MB/s, rmw enabled Feb 12 19:35:44.952421 kernel: raid6: using neon recovery algorithm Feb 12 19:35:44.969150 kernel: xor: measuring software checksum speed Feb 12 19:35:44.977387 kernel: 8regs : 17300 MB/sec Feb 12 19:35:44.977397 kernel: 32regs : 20760 MB/sec Feb 12 19:35:44.981297 kernel: arm64_neon : 27797 MB/sec Feb 12 19:35:44.981308 kernel: xor: using function: arm64_neon (27797 MB/sec) Feb 12 19:35:45.041163 kernel: Btrfs loaded, crc32c=crc32c-generic, zoned=no, fsverity=no Feb 12 19:35:45.051388 systemd[1]: Finished dracut-pre-udev.service. Feb 12 19:35:45.055000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:45.059000 audit: BPF prog-id=7 op=LOAD Feb 12 19:35:45.059000 audit: BPF prog-id=8 op=LOAD Feb 12 19:35:45.060180 systemd[1]: Starting systemd-udevd.service... Feb 12 19:35:45.078651 systemd-udevd[476]: Using default interface naming scheme 'v252'. Feb 12 19:35:45.085247 systemd[1]: Started systemd-udevd.service. Feb 12 19:35:45.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:45.096738 systemd[1]: Starting dracut-pre-trigger.service... Feb 12 19:35:45.110511 dracut-pre-trigger[497]: rd.md=0: removing MD RAID activation Feb 12 19:35:45.141801 systemd[1]: Finished dracut-pre-trigger.service. Feb 12 19:35:45.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:45.147349 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:35:45.188000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:45.183608 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:35:45.250244 kernel: hv_vmbus: Vmbus version:5.3 Feb 12 19:35:45.259161 kernel: hv_vmbus: registering driver hid_hyperv Feb 12 19:35:45.268162 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input0 Feb 12 19:35:45.273163 kernel: hv_vmbus: registering driver hv_netvsc Feb 12 19:35:45.273190 kernel: hid-generic 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Feb 12 19:35:45.286163 kernel: hv_vmbus: registering driver hyperv_keyboard Feb 12 19:35:45.292167 kernel: hv_vmbus: registering driver hv_storvsc Feb 12 19:35:45.309154 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input1 Feb 12 19:35:45.309186 kernel: scsi host0: storvsc_host_t Feb 12 19:35:45.317186 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Feb 12 19:35:45.317239 kernel: scsi host1: storvsc_host_t Feb 12 19:35:45.328159 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Feb 12 19:35:45.348971 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Feb 12 19:35:45.349180 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Feb 12 19:35:45.357510 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Feb 12 19:35:45.357659 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Feb 12 19:35:45.357751 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Feb 12 19:35:45.367332 kernel: hv_netvsc 000d3afe-8c46-000d-3afe-8c46000d3afe eth0: VF slot 1 added Feb 12 19:35:45.367493 kernel: sd 0:0:0:0: [sda] Write Protect is off Feb 12 19:35:45.372170 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Feb 12 19:35:45.372321 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Feb 12 19:35:45.388179 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:35:45.397167 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Feb 12 19:35:45.403174 kernel: hv_vmbus: registering driver hv_pci Feb 12 19:35:45.413525 kernel: hv_pci 3335d226-0541-4f8d-8e3e-e015857ca4a3: PCI VMBus probing: Using version 0x10004 Feb 12 19:35:45.413781 kernel: hv_pci 3335d226-0541-4f8d-8e3e-e015857ca4a3: PCI host bridge to bus 0541:00 Feb 12 19:35:45.426399 kernel: pci_bus 0541:00: root bus resource [mem 0xfc0000000-0xfc00fffff window] Feb 12 19:35:45.435517 kernel: pci_bus 0541:00: No busn resource found for root bus, will use [bus 00-ff] Feb 12 19:35:45.444623 kernel: pci 0541:00:02.0: [15b3:1018] type 00 class 0x020000 Feb 12 19:35:45.455749 kernel: pci 0541:00:02.0: reg 0x10: [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:35:45.476173 kernel: pci 0541:00:02.0: enabling Extended Tags Feb 12 19:35:45.500163 kernel: pci 0541:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at 0541:00:02.0 (capable of 126.016 Gb/s with 8.0 GT/s PCIe x16 link) Feb 12 19:35:45.500352 kernel: pci_bus 0541:00: busn_res: [bus 00-ff] end is updated to 00 Feb 12 19:35:45.507043 kernel: pci 0541:00:02.0: BAR 0: assigned [mem 0xfc0000000-0xfc00fffff 64bit pref] Feb 12 19:35:45.549171 kernel: mlx5_core 0541:00:02.0: firmware version: 16.30.1284 Feb 12 19:35:45.711155 kernel: mlx5_core 0541:00:02.0: MLX5E: StrdRq(1) RqSz(8) StrdSz(2048) RxCqeCmprss(0) Feb 12 19:35:45.770212 kernel: hv_netvsc 000d3afe-8c46-000d-3afe-8c46000d3afe eth0: VF registering: eth1 Feb 12 19:35:45.770405 kernel: mlx5_core 0541:00:02.0 eth1: joined to eth0 Feb 12 19:35:45.782156 kernel: mlx5_core 0541:00:02.0 enP1345s1: renamed from eth1 Feb 12 19:35:45.813294 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Feb 12 19:35:45.887166 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (537) Feb 12 19:35:45.900093 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:35:46.050170 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Feb 12 19:35:46.113885 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Feb 12 19:35:46.120478 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Feb 12 19:35:46.135076 systemd[1]: Starting disk-uuid.service... Feb 12 19:35:46.160199 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:35:47.177156 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Feb 12 19:35:47.178246 disk-uuid[603]: The operation has completed successfully. Feb 12 19:35:47.231446 systemd[1]: disk-uuid.service: Deactivated successfully. Feb 12 19:35:47.235000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:47.235000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:47.231549 systemd[1]: Finished disk-uuid.service. Feb 12 19:35:47.244891 systemd[1]: Starting verity-setup.service... Feb 12 19:35:47.287171 kernel: device-mapper: verity: sha256 using implementation "sha256-ce" Feb 12 19:35:47.481096 systemd[1]: Found device dev-mapper-usr.device. Feb 12 19:35:47.490208 systemd[1]: Finished verity-setup.service. Feb 12 19:35:47.498000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:47.499092 systemd[1]: Mounting sysusr-usr.mount... Feb 12 19:35:47.560161 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Feb 12 19:35:47.560217 systemd[1]: Mounted sysusr-usr.mount. Feb 12 19:35:47.564418 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Feb 12 19:35:47.565266 systemd[1]: Starting ignition-setup.service... Feb 12 19:35:47.572117 systemd[1]: Starting parse-ip-for-networkd.service... Feb 12 19:35:47.613044 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:35:47.613099 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:35:47.617646 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:35:47.662420 systemd[1]: Finished parse-ip-for-networkd.service. Feb 12 19:35:47.667000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:47.671000 audit: BPF prog-id=9 op=LOAD Feb 12 19:35:47.672436 systemd[1]: Starting systemd-networkd.service... Feb 12 19:35:47.694530 systemd-networkd[867]: lo: Link UP Feb 12 19:35:47.694543 systemd-networkd[867]: lo: Gained carrier Feb 12 19:35:47.695273 systemd-networkd[867]: Enumeration completed Feb 12 19:35:47.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:47.697982 systemd[1]: Started systemd-networkd.service. Feb 12 19:35:47.698504 systemd-networkd[867]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:35:47.706655 systemd[1]: Reached target network.target. Feb 12 19:35:47.718584 systemd[1]: Starting iscsiuio.service... Feb 12 19:35:47.737000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:47.729665 systemd[1]: Started iscsiuio.service. Feb 12 19:35:47.738348 systemd[1]: Starting iscsid.service... Feb 12 19:35:47.755000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:47.751598 systemd[1]: Started iscsid.service. Feb 12 19:35:47.767801 iscsid[874]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:35:47.767801 iscsid[874]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log Feb 12 19:35:47.767801 iscsid[874]: into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Feb 12 19:35:47.767801 iscsid[874]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Feb 12 19:35:47.767801 iscsid[874]: If using hardware iscsi like qla4xxx this message can be ignored. Feb 12 19:35:47.767801 iscsid[874]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Feb 12 19:35:47.767801 iscsid[874]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Feb 12 19:35:47.780000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:47.759858 systemd[1]: Starting dracut-initqueue.service... Feb 12 19:35:47.775207 systemd[1]: Finished dracut-initqueue.service. Feb 12 19:35:47.870000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:47.780285 systemd[1]: Reached target remote-fs-pre.target. Feb 12 19:35:47.790224 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:35:47.807646 systemd[1]: Reached target remote-fs.target. Feb 12 19:35:47.826221 systemd[1]: Starting dracut-pre-mount.service... Feb 12 19:35:47.861016 systemd[1]: Finished dracut-pre-mount.service. Feb 12 19:35:47.902207 kernel: mlx5_core 0541:00:02.0 enP1345s1: Link up Feb 12 19:35:47.877391 systemd[1]: mnt-oem.mount: Deactivated successfully. Feb 12 19:35:47.947582 kernel: hv_netvsc 000d3afe-8c46-000d-3afe-8c46000d3afe eth0: Data path switched to VF: enP1345s1 Feb 12 19:35:47.947853 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:35:47.948326 systemd-networkd[867]: enP1345s1: Link UP Feb 12 19:35:47.948557 systemd-networkd[867]: eth0: Link UP Feb 12 19:35:47.948885 systemd-networkd[867]: eth0: Gained carrier Feb 12 19:35:47.961572 systemd-networkd[867]: enP1345s1: Gained carrier Feb 12 19:35:47.976196 systemd-networkd[867]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:35:48.039410 systemd[1]: Finished ignition-setup.service. Feb 12 19:35:48.043000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:48.054909 kernel: kauditd_printk_skb: 17 callbacks suppressed Feb 12 19:35:48.054945 kernel: audit: type=1130 audit(1707766548.043:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:48.053168 systemd[1]: Starting ignition-fetch-offline.service... Feb 12 19:35:49.269308 systemd-networkd[867]: eth0: Gained IPv6LL Feb 12 19:35:51.860333 ignition[894]: Ignition 2.14.0 Feb 12 19:35:51.860346 ignition[894]: Stage: fetch-offline Feb 12 19:35:51.860401 ignition[894]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:35:51.860425 ignition[894]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:35:51.946437 ignition[894]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:35:51.946593 ignition[894]: parsed url from cmdline: "" Feb 12 19:35:51.946597 ignition[894]: no config URL provided Feb 12 19:35:51.946602 ignition[894]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:35:51.956046 systemd[1]: Finished ignition-fetch-offline.service. Feb 12 19:35:52.001407 kernel: audit: type=1130 audit(1707766551.968:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:51.968000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:51.946612 ignition[894]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:35:51.969430 systemd[1]: Starting ignition-fetch.service... Feb 12 19:35:51.946617 ignition[894]: failed to fetch config: resource requires networking Feb 12 19:35:51.946944 ignition[894]: Ignition finished successfully Feb 12 19:35:52.004995 ignition[900]: Ignition 2.14.0 Feb 12 19:35:52.005002 ignition[900]: Stage: fetch Feb 12 19:35:52.005104 ignition[900]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:35:52.005122 ignition[900]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:35:52.008481 ignition[900]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:35:52.008626 ignition[900]: parsed url from cmdline: "" Feb 12 19:35:52.008630 ignition[900]: no config URL provided Feb 12 19:35:52.008635 ignition[900]: reading system config file "/usr/lib/ignition/user.ign" Feb 12 19:35:52.008646 ignition[900]: no config at "/usr/lib/ignition/user.ign" Feb 12 19:35:52.008674 ignition[900]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Feb 12 19:35:52.032230 ignition[900]: GET result: OK Feb 12 19:35:52.032257 ignition[900]: failed to retrieve userdata from IMDS, falling back to custom data: not a config (empty) Feb 12 19:35:52.119995 ignition[900]: opening config device: "/dev/sr0" Feb 12 19:35:52.120417 ignition[900]: getting drive status for "/dev/sr0" Feb 12 19:35:52.120499 ignition[900]: drive status: OK Feb 12 19:35:52.123815 ignition[900]: mounting config device Feb 12 19:35:52.124225 ignition[900]: op(1): [started] mounting "/dev/sr0" at "/tmp/ignition-azure1415157277" Feb 12 19:35:52.152167 kernel: UDF-fs: INFO Mounting volume 'UDF Volume', timestamp 2024/02/13 00:00 (1000) Feb 12 19:35:52.152246 ignition[900]: op(1): [finished] mounting "/dev/sr0" at "/tmp/ignition-azure1415157277" Feb 12 19:35:52.153362 systemd[1]: tmp-ignition\x2dazure1415157277.mount: Deactivated successfully. Feb 12 19:35:52.152251 ignition[900]: checking for config drive Feb 12 19:35:52.152602 ignition[900]: reading config Feb 12 19:35:52.153051 ignition[900]: op(2): [started] unmounting "/dev/sr0" at "/tmp/ignition-azure1415157277" Feb 12 19:35:52.153133 ignition[900]: op(2): [finished] unmounting "/dev/sr0" at "/tmp/ignition-azure1415157277" Feb 12 19:35:52.153158 ignition[900]: config has been read from custom data Feb 12 19:35:52.153243 ignition[900]: parsing config with SHA512: 668657be3293a9b89d640879405b83a9c34ac86e850e4ae8ef6694a37d884e08774a6b2bc6c2a8f188dd7622c3bccf631d30ed3e19377cddd558dbbd3e94328c Feb 12 19:35:52.202052 unknown[900]: fetched base config from "system" Feb 12 19:35:52.202064 unknown[900]: fetched base config from "system" Feb 12 19:35:52.202663 ignition[900]: fetch: fetch complete Feb 12 19:35:52.216000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:52.202068 unknown[900]: fetched user config from "azure" Feb 12 19:35:52.249637 kernel: audit: type=1130 audit(1707766552.216:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:52.202668 ignition[900]: fetch: fetch passed Feb 12 19:35:52.211933 systemd[1]: Finished ignition-fetch.service. Feb 12 19:35:52.202709 ignition[900]: Ignition finished successfully Feb 12 19:35:52.265000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:52.240224 systemd[1]: Starting ignition-kargs.service... Feb 12 19:35:52.285919 kernel: audit: type=1130 audit(1707766552.265:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:52.252648 ignition[908]: Ignition 2.14.0 Feb 12 19:35:52.261623 systemd[1]: Finished ignition-kargs.service. Feb 12 19:35:52.252654 ignition[908]: Stage: kargs Feb 12 19:35:52.252778 ignition[908]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:35:52.252802 ignition[908]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:35:52.302319 systemd[1]: Starting ignition-disks.service... Feb 12 19:35:52.256391 ignition[908]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:35:52.258755 ignition[908]: kargs: kargs passed Feb 12 19:35:52.258814 ignition[908]: Ignition finished successfully Feb 12 19:35:52.313216 ignition[914]: Ignition 2.14.0 Feb 12 19:35:52.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:52.320438 systemd[1]: Finished ignition-disks.service. Feb 12 19:35:52.361606 kernel: audit: type=1130 audit(1707766552.328:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:52.313223 ignition[914]: Stage: disks Feb 12 19:35:52.345933 systemd[1]: Reached target initrd-root-device.target. Feb 12 19:35:52.313335 ignition[914]: reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:35:52.353188 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:35:52.313362 ignition[914]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:35:52.358196 systemd[1]: Reached target local-fs.target. Feb 12 19:35:52.316947 ignition[914]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:35:52.365920 systemd[1]: Reached target sysinit.target. Feb 12 19:35:52.319369 ignition[914]: disks: disks passed Feb 12 19:35:52.372884 systemd[1]: Reached target basic.target. Feb 12 19:35:52.319423 ignition[914]: Ignition finished successfully Feb 12 19:35:52.382050 systemd[1]: Starting systemd-fsck-root.service... Feb 12 19:35:52.441928 systemd-fsck[922]: ROOT: clean, 602/7326000 files, 481070/7359488 blocks Feb 12 19:35:52.451130 systemd[1]: Finished systemd-fsck-root.service. Feb 12 19:35:52.455000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:52.478835 systemd[1]: Mounting sysroot.mount... Feb 12 19:35:52.486393 kernel: audit: type=1130 audit(1707766552.455:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:52.503161 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Feb 12 19:35:52.503888 systemd[1]: Mounted sysroot.mount. Feb 12 19:35:52.507948 systemd[1]: Reached target initrd-root-fs.target. Feb 12 19:35:52.547952 systemd[1]: Mounting sysroot-usr.mount... Feb 12 19:35:52.553057 systemd[1]: Starting flatcar-metadata-hostname.service... Feb 12 19:35:52.561288 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Feb 12 19:35:52.561324 systemd[1]: Reached target ignition-diskful.target. Feb 12 19:35:52.568088 systemd[1]: Mounted sysroot-usr.mount. Feb 12 19:35:52.607572 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:35:52.612942 systemd[1]: Starting initrd-setup-root.service... Feb 12 19:35:52.638205 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (932) Feb 12 19:35:52.648010 initrd-setup-root[937]: cut: /sysroot/etc/passwd: No such file or directory Feb 12 19:35:52.667662 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:35:52.667686 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:35:52.667695 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:35:52.676764 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:35:52.687561 initrd-setup-root[963]: cut: /sysroot/etc/group: No such file or directory Feb 12 19:35:52.696051 initrd-setup-root[971]: cut: /sysroot/etc/shadow: No such file or directory Feb 12 19:35:52.705085 initrd-setup-root[979]: cut: /sysroot/etc/gshadow: No such file or directory Feb 12 19:35:53.231250 systemd[1]: Finished initrd-setup-root.service. Feb 12 19:35:53.259785 kernel: audit: type=1130 audit(1707766553.236:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:53.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:53.237425 systemd[1]: Starting ignition-mount.service... Feb 12 19:35:53.260302 systemd[1]: Starting sysroot-boot.service... Feb 12 19:35:53.274511 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Feb 12 19:35:53.274663 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Feb 12 19:35:53.295706 systemd[1]: Finished sysroot-boot.service. Feb 12 19:35:53.300000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:53.322225 kernel: audit: type=1130 audit(1707766553.300:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:53.329795 ignition[1001]: INFO : Ignition 2.14.0 Feb 12 19:35:53.329795 ignition[1001]: INFO : Stage: mount Feb 12 19:35:53.340206 ignition[1001]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:35:53.340206 ignition[1001]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:35:53.340206 ignition[1001]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:35:53.340206 ignition[1001]: INFO : mount: mount passed Feb 12 19:35:53.340206 ignition[1001]: INFO : Ignition finished successfully Feb 12 19:35:53.397021 kernel: audit: type=1130 audit(1707766553.351:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:53.351000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:53.347045 systemd[1]: Finished ignition-mount.service. Feb 12 19:35:54.361799 coreos-metadata[931]: Feb 12 19:35:54.361 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Feb 12 19:35:54.370073 coreos-metadata[931]: Feb 12 19:35:54.366 INFO Fetch successful Feb 12 19:35:54.399964 coreos-metadata[931]: Feb 12 19:35:54.399 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Feb 12 19:35:54.421019 coreos-metadata[931]: Feb 12 19:35:54.420 INFO Fetch successful Feb 12 19:35:54.426766 coreos-metadata[931]: Feb 12 19:35:54.426 INFO wrote hostname ci-3510.3.2-a-04a5975e1d to /sysroot/etc/hostname Feb 12 19:35:54.435996 systemd[1]: Finished flatcar-metadata-hostname.service. Feb 12 19:35:54.464509 kernel: audit: type=1130 audit(1707766554.441:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:54.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:54.442343 systemd[1]: Starting ignition-files.service... Feb 12 19:35:54.471635 systemd[1]: Mounting sysroot-usr-share-oem.mount... Feb 12 19:35:54.488156 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (1011) Feb 12 19:35:54.500200 kernel: BTRFS info (device sda6): using crc32c (crc32c-generic) checksum algorithm Feb 12 19:35:54.500215 kernel: BTRFS info (device sda6): using free space tree Feb 12 19:35:54.504956 kernel: BTRFS info (device sda6): has skinny extents Feb 12 19:35:54.511393 systemd[1]: Mounted sysroot-usr-share-oem.mount. Feb 12 19:35:54.524953 ignition[1030]: INFO : Ignition 2.14.0 Feb 12 19:35:54.524953 ignition[1030]: INFO : Stage: files Feb 12 19:35:54.536130 ignition[1030]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:35:54.536130 ignition[1030]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:35:54.536130 ignition[1030]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:35:54.536130 ignition[1030]: DEBUG : files: compiled without relabeling support, skipping Feb 12 19:35:54.536130 ignition[1030]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Feb 12 19:35:54.536130 ignition[1030]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Feb 12 19:35:54.647314 ignition[1030]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Feb 12 19:35:54.655130 ignition[1030]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Feb 12 19:35:54.655130 ignition[1030]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Feb 12 19:35:54.670891 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:35:54.670891 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.27.0/crictl-v1.27.0-linux-arm64.tar.gz: attempt #1 Feb 12 19:35:54.655216 unknown[1030]: wrote ssh authorized keys file for user: core Feb 12 19:35:55.181273 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Feb 12 19:35:55.342431 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(3): file matches expected sum of: db062e43351a63347871e7094115be2ae3853afcd346d47f7b51141da8c3202c2df58d2e17359322f632abcb37474fd7fdb3b7aadbc5cfd5cf6d3bad040b6251 Feb 12 19:35:55.358722 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/crictl-v1.27.0-linux-arm64.tar.gz" Feb 12 19:35:55.358722 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:35:55.358722 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET https://get.helm.sh/helm-v3.13.2-linux-arm64.tar.gz: attempt #1 Feb 12 19:35:55.801410 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): GET result: OK Feb 12 19:35:56.043363 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-arm64.tar.gz" Feb 12 19:35:56.054449 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:35:56.054449 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET https://github.com/containernetworking/plugins/releases/download/v1.3.0/cni-plugins-linux-arm64-v1.3.0.tgz: attempt #1 Feb 12 19:35:56.447566 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): GET result: OK Feb 12 19:35:56.729826 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(5): file matches expected sum of: b2b7fb74f1b3cb8928f49e5bf9d4bc686e057e837fac3caf1b366d54757921dba80d70cc010399b274d136e8dee9a25b1ad87cdfdc4ffcf42cf88f3e8f99587a Feb 12 19:35:56.746003 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/opt/cni-plugins-linux-arm64-v1.3.0.tgz" Feb 12 19:35:56.746003 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:35:56.746003 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubectl: attempt #1 Feb 12 19:35:57.079929 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): GET result: OK Feb 12 19:35:57.379977 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(6): file matches expected sum of: 6a5c9c02a29126949f096415bb1761a0c0ad44168e2ab3d0409982701da58f96223bec354828ddf958e945ef1ce63c0ad41e77cbcbcce0756163e71b4fbae432 Feb 12 19:35:57.396258 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/opt/bin/kubectl" Feb 12 19:35:57.396258 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:35:57.396258 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubeadm: attempt #1 Feb 12 19:35:57.440063 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): GET result: OK Feb 12 19:35:57.723965 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(7): file matches expected sum of: 5a08b81f9cc82d3cce21130856ca63b8dafca9149d9775dd25b376eb0f18209aa0e4a47c0a6d7e6fb1316aacd5d59dec770f26c09120c866949d70bc415518b3 Feb 12 19:35:57.741700 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/opt/bin/kubeadm" Feb 12 19:35:57.741700 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:35:57.741700 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET https://dl.k8s.io/release/v1.28.1/bin/linux/arm64/kubelet: attempt #1 Feb 12 19:35:57.799373 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): GET result: OK Feb 12 19:35:58.423212 ignition[1030]: DEBUG : files: createFilesystemsFiles: createFiles: op(8): file matches expected sum of: 5a898ef543a6482895101ea58e33602e3c0a7682d322aaf08ac3dc8a5a3c8da8f09600d577024549288f8cebb1a86f9c79927796b69a3d8fe989ca8f12b147d6 Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/opt/bin/kubelet" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing file "/sysroot/etc/docker/daemon.json" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/home/core/install.sh" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/home/core/install.sh" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(b): [started] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(b): [finished] writing file "/sysroot/home/core/nginx.yaml" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(c): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(c): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(d): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(d): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/flatcar/update.conf" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:35:58.442220 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:35:58.680096 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (1032) Feb 12 19:35:58.680123 kernel: audit: type=1130 audit(1707766558.565:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.680178 kernel: audit: type=1130 audit(1707766558.625:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.680190 kernel: audit: type=1131 audit(1707766558.652:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.565000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.652000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3955928244" Feb 12 19:35:58.680295 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(f): op(10): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3955928244": device or resource busy Feb 12 19:35:58.680295 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(f): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem3955928244", trying btrfs: device or resource busy Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3955928244" Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(11): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem3955928244" Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [started] unmounting "/mnt/oem3955928244" Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): op(12): [finished] unmounting "/mnt/oem3955928244" Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(f): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): oem config not found in "/usr/share/oem", looking on oem partition Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(14): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4015837357" Feb 12 19:35:58.680295 ignition[1030]: CRITICAL : files: createFilesystemsFiles: createFiles: op(13): op(14): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4015837357": device or resource busy Feb 12 19:35:58.680295 ignition[1030]: ERROR : files: createFilesystemsFiles: createFiles: op(13): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4015837357", trying btrfs: device or resource busy Feb 12 19:35:58.680295 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4015837357" Feb 12 19:35:58.910004 kernel: audit: type=1130 audit(1707766558.733:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.910028 kernel: audit: type=1130 audit(1707766558.837:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.910046 kernel: audit: type=1131 audit(1707766558.866:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.733000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.837000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.866000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.521959 systemd[1]: mnt-oem3955928244.mount: Deactivated successfully. Feb 12 19:35:58.920923 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(15): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4015837357" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [started] unmounting "/mnt/oem4015837357" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): op(16): [finished] unmounting "/mnt/oem4015837357" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: createFilesystemsFiles: createFiles: op(13): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(17): [started] processing unit "waagent.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(17): [finished] processing unit "waagent.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(18): [started] processing unit "nvidia.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(18): [finished] processing unit "nvidia.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(19): [started] processing unit "prepare-helm.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(19): op(1a): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(19): op(1a): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(19): [finished] processing unit "prepare-helm.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(1b): [started] processing unit "prepare-cni-plugins.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(1b): op(1c): [started] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(1b): op(1c): [finished] writing unit "prepare-cni-plugins.service" at "/sysroot/etc/systemd/system/prepare-cni-plugins.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(1b): [finished] processing unit "prepare-cni-plugins.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(1d): [started] processing unit "prepare-critools.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(1d): op(1e): [started] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:35:58.920923 ignition[1030]: INFO : files: op(1d): op(1e): [finished] writing unit "prepare-critools.service" at "/sysroot/etc/systemd/system/prepare-critools.service" Feb 12 19:35:59.184847 kernel: audit: type=1130 audit(1707766558.988:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.184880 kernel: audit: type=1131 audit(1707766559.073:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.073000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.551202 systemd[1]: Finished ignition-files.service. Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(1d): [finished] processing unit "prepare-critools.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(1f): [started] setting preset to enabled for "waagent.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(1f): [finished] setting preset to enabled for "waagent.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(20): [started] setting preset to enabled for "nvidia.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(20): [finished] setting preset to enabled for "nvidia.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(21): [started] setting preset to enabled for "prepare-helm.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(21): [finished] setting preset to enabled for "prepare-helm.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(22): [started] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(22): [finished] setting preset to enabled for "prepare-cni-plugins.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(23): [started] setting preset to enabled for "prepare-critools.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: op(23): [finished] setting preset to enabled for "prepare-critools.service" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: createResultFile: createFiles: op(24): [started] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: createResultFile: createFiles: op(24): [finished] writing file "/sysroot/etc/.ignition-result.json" Feb 12 19:35:59.193466 ignition[1030]: INFO : files: files passed Feb 12 19:35:59.193466 ignition[1030]: INFO : Ignition finished successfully Feb 12 19:35:59.400005 kernel: audit: type=1131 audit(1707766559.243:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.400031 kernel: audit: type=1131 audit(1707766559.283:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.243000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.311000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.323000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.336000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.591991 systemd[1]: Starting initrd-setup-root-after-ignition.service... Feb 12 19:35:59.411708 initrd-setup-root-after-ignition[1055]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Feb 12 19:35:59.416000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.426900 iscsid[874]: iscsid shutting down. Feb 12 19:35:59.430000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.597124 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Feb 12 19:35:59.438000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.597888 systemd[1]: Starting ignition-quench.service... Feb 12 19:35:59.453000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.453000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.621637 systemd[1]: ignition-quench.service: Deactivated successfully. Feb 12 19:35:59.467000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.621731 systemd[1]: Finished ignition-quench.service. Feb 12 19:35:59.476000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.719039 systemd[1]: Finished initrd-setup-root-after-ignition.service. Feb 12 19:35:59.484000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.761407 systemd[1]: Reached target ignition-complete.target. Feb 12 19:35:59.493000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.784404 systemd[1]: Starting initrd-parse-etc.service... Feb 12 19:35:59.502000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.506967 ignition[1068]: INFO : Ignition 2.14.0 Feb 12 19:35:59.506967 ignition[1068]: INFO : Stage: umount Feb 12 19:35:59.506967 ignition[1068]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Feb 12 19:35:59.506967 ignition[1068]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Feb 12 19:35:59.506967 ignition[1068]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Feb 12 19:35:59.506967 ignition[1068]: INFO : umount: umount passed Feb 12 19:35:59.506967 ignition[1068]: INFO : Ignition finished successfully Feb 12 19:35:59.569000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.824052 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Feb 12 19:35:58.824182 systemd[1]: Finished initrd-parse-etc.service. Feb 12 19:35:58.866480 systemd[1]: Reached target initrd-fs.target. Feb 12 19:35:59.590000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.897840 systemd[1]: Reached target initrd.target. Feb 12 19:35:59.598000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.914053 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Feb 12 19:35:58.915011 systemd[1]: Starting dracut-pre-pivot.service... Feb 12 19:35:58.978533 systemd[1]: Finished dracut-pre-pivot.service. Feb 12 19:35:59.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:58.989904 systemd[1]: Starting initrd-cleanup.service... Feb 12 19:35:59.024211 systemd[1]: Stopped target nss-lookup.target. Feb 12 19:35:59.033203 systemd[1]: Stopped target remote-cryptsetup.target. Feb 12 19:35:59.047912 systemd[1]: Stopped target timers.target. Feb 12 19:35:59.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.062328 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Feb 12 19:35:59.662000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.062392 systemd[1]: Stopped dracut-pre-pivot.service. Feb 12 19:35:59.672000 audit: BPF prog-id=6 op=UNLOAD Feb 12 19:35:59.073533 systemd[1]: Stopped target initrd.target. Feb 12 19:35:59.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.102905 systemd[1]: Stopped target basic.target. Feb 12 19:35:59.693000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.118654 systemd[1]: Stopped target ignition-complete.target. Feb 12 19:35:59.701000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.134664 systemd[1]: Stopped target ignition-diskful.target. Feb 12 19:35:59.146815 systemd[1]: Stopped target initrd-root-device.target. Feb 12 19:35:59.158593 systemd[1]: Stopped target remote-fs.target. Feb 12 19:35:59.723000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.174003 systemd[1]: Stopped target remote-fs-pre.target. Feb 12 19:35:59.189333 systemd[1]: Stopped target sysinit.target. Feb 12 19:35:59.197579 systemd[1]: Stopped target local-fs.target. Feb 12 19:35:59.748000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.208935 systemd[1]: Stopped target local-fs-pre.target. Feb 12 19:35:59.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.220607 systemd[1]: Stopped target swap.target. Feb 12 19:35:59.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.231845 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Feb 12 19:35:59.231911 systemd[1]: Stopped dracut-pre-mount.service. Feb 12 19:35:59.790596 kernel: hv_netvsc 000d3afe-8c46-000d-3afe-8c46000d3afe eth0: Data path switched from VF: enP1345s1 Feb 12 19:35:59.243473 systemd[1]: Stopped target cryptsetup.target. Feb 12 19:35:59.795000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.271820 systemd[1]: dracut-initqueue.service: Deactivated successfully. Feb 12 19:35:59.804000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.804000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.271880 systemd[1]: Stopped dracut-initqueue.service. Feb 12 19:35:59.283605 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Feb 12 19:35:59.283644 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Feb 12 19:35:59.312127 systemd[1]: ignition-files.service: Deactivated successfully. Feb 12 19:35:59.312178 systemd[1]: Stopped ignition-files.service. Feb 12 19:35:59.324014 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Feb 12 19:35:59.324054 systemd[1]: Stopped flatcar-metadata-hostname.service. Feb 12 19:35:59.337638 systemd[1]: Stopping ignition-mount.service... Feb 12 19:35:59.354218 systemd[1]: Stopping iscsid.service... Feb 12 19:35:59.371600 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Feb 12 19:35:59.371696 systemd[1]: Stopped kmod-static-nodes.service. Feb 12 19:35:59.391181 systemd[1]: Stopping sysroot-boot.service... Feb 12 19:35:59.406697 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Feb 12 19:35:59.406788 systemd[1]: Stopped systemd-udev-trigger.service. Feb 12 19:35:59.416555 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Feb 12 19:35:59.416610 systemd[1]: Stopped dracut-pre-trigger.service. Feb 12 19:35:59.431608 systemd[1]: iscsid.service: Deactivated successfully. Feb 12 19:35:59.431716 systemd[1]: Stopped iscsid.service. Feb 12 19:35:59.438799 systemd[1]: initrd-cleanup.service: Deactivated successfully. Feb 12 19:35:59.438877 systemd[1]: Finished initrd-cleanup.service. Feb 12 19:35:59.454574 systemd[1]: sysroot-boot.mount: Deactivated successfully. Feb 12 19:35:59.455054 systemd[1]: ignition-mount.service: Deactivated successfully. Feb 12 19:35:59.911000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:35:59.455232 systemd[1]: Stopped ignition-mount.service. Feb 12 19:35:59.467391 systemd[1]: ignition-disks.service: Deactivated successfully. Feb 12 19:35:59.467449 systemd[1]: Stopped ignition-disks.service. Feb 12 19:35:59.476678 systemd[1]: ignition-kargs.service: Deactivated successfully. Feb 12 19:35:59.476722 systemd[1]: Stopped ignition-kargs.service. Feb 12 19:35:59.484778 systemd[1]: ignition-fetch.service: Deactivated successfully. Feb 12 19:35:59.484816 systemd[1]: Stopped ignition-fetch.service. Feb 12 19:35:59.969535 systemd-journald[276]: Received SIGTERM from PID 1 (n/a). Feb 12 19:35:59.493964 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Feb 12 19:35:59.494008 systemd[1]: Stopped ignition-fetch-offline.service. Feb 12 19:35:59.502969 systemd[1]: Stopped target paths.target. Feb 12 19:35:59.510847 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Feb 12 19:35:59.518110 systemd[1]: Stopped systemd-ask-password-console.path. Feb 12 19:35:59.523584 systemd[1]: Stopped target slices.target. Feb 12 19:35:59.534414 systemd[1]: Stopped target sockets.target. Feb 12 19:35:59.551441 systemd[1]: iscsid.socket: Deactivated successfully. Feb 12 19:35:59.551491 systemd[1]: Closed iscsid.socket. Feb 12 19:35:59.561613 systemd[1]: ignition-setup.service: Deactivated successfully. Feb 12 19:35:59.561660 systemd[1]: Stopped ignition-setup.service. Feb 12 19:35:59.569928 systemd[1]: Stopping iscsiuio.service... Feb 12 19:35:59.583648 systemd[1]: iscsiuio.service: Deactivated successfully. Feb 12 19:35:59.583738 systemd[1]: Stopped iscsiuio.service. Feb 12 19:35:59.591019 systemd[1]: sysroot-boot.service: Deactivated successfully. Feb 12 19:35:59.591088 systemd[1]: Stopped sysroot-boot.service. Feb 12 19:35:59.598833 systemd[1]: Stopped target network.target. Feb 12 19:35:59.606566 systemd[1]: iscsiuio.socket: Deactivated successfully. Feb 12 19:35:59.606598 systemd[1]: Closed iscsiuio.socket. Feb 12 19:35:59.617208 systemd[1]: initrd-setup-root.service: Deactivated successfully. Feb 12 19:35:59.617253 systemd[1]: Stopped initrd-setup-root.service. Feb 12 19:35:59.625972 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:35:59.633550 systemd[1]: Stopping systemd-resolved.service... Feb 12 19:35:59.641212 systemd-networkd[867]: eth0: DHCPv6 lease lost Feb 12 19:35:59.970000 audit: BPF prog-id=9 op=UNLOAD Feb 12 19:35:59.645248 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:35:59.645345 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:35:59.654865 systemd[1]: systemd-resolved.service: Deactivated successfully. Feb 12 19:35:59.654953 systemd[1]: Stopped systemd-resolved.service. Feb 12 19:35:59.663595 systemd[1]: systemd-networkd.socket: Deactivated successfully. Feb 12 19:35:59.663636 systemd[1]: Closed systemd-networkd.socket. Feb 12 19:35:59.673392 systemd[1]: Stopping network-cleanup.service... Feb 12 19:35:59.681308 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Feb 12 19:35:59.681366 systemd[1]: Stopped parse-ip-for-networkd.service. Feb 12 19:35:59.686024 systemd[1]: systemd-sysctl.service: Deactivated successfully. Feb 12 19:35:59.686077 systemd[1]: Stopped systemd-sysctl.service. Feb 12 19:35:59.697068 systemd[1]: systemd-modules-load.service: Deactivated successfully. Feb 12 19:35:59.697109 systemd[1]: Stopped systemd-modules-load.service. Feb 12 19:35:59.702107 systemd[1]: Stopping systemd-udevd.service... Feb 12 19:35:59.712284 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Feb 12 19:35:59.714872 systemd[1]: systemd-udevd.service: Deactivated successfully. Feb 12 19:35:59.715015 systemd[1]: Stopped systemd-udevd.service. Feb 12 19:35:59.724430 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Feb 12 19:35:59.724476 systemd[1]: Closed systemd-udevd-control.socket. Feb 12 19:35:59.732432 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Feb 12 19:35:59.732474 systemd[1]: Closed systemd-udevd-kernel.socket. Feb 12 19:35:59.740771 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Feb 12 19:35:59.740821 systemd[1]: Stopped dracut-pre-udev.service. Feb 12 19:35:59.748599 systemd[1]: dracut-cmdline.service: Deactivated successfully. Feb 12 19:35:59.748641 systemd[1]: Stopped dracut-cmdline.service. Feb 12 19:35:59.756524 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Feb 12 19:35:59.756559 systemd[1]: Stopped dracut-cmdline-ask.service. Feb 12 19:35:59.768103 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Feb 12 19:35:59.786546 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Feb 12 19:35:59.786612 systemd[1]: Stopped systemd-vconsole-setup.service. Feb 12 19:35:59.795832 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Feb 12 19:35:59.795929 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Feb 12 19:35:59.903390 systemd[1]: network-cleanup.service: Deactivated successfully. Feb 12 19:35:59.903499 systemd[1]: Stopped network-cleanup.service. Feb 12 19:35:59.912081 systemd[1]: Reached target initrd-switch-root.target. Feb 12 19:35:59.922280 systemd[1]: Starting initrd-switch-root.service... Feb 12 19:35:59.940808 systemd[1]: Switching root. Feb 12 19:35:59.971112 systemd-journald[276]: Journal stopped Feb 12 19:36:13.964991 kernel: SELinux: Class mctp_socket not defined in policy. Feb 12 19:36:13.965012 kernel: SELinux: Class anon_inode not defined in policy. Feb 12 19:36:13.965022 kernel: SELinux: the above unknown classes and permissions will be allowed Feb 12 19:36:13.965032 kernel: SELinux: policy capability network_peer_controls=1 Feb 12 19:36:13.965040 kernel: SELinux: policy capability open_perms=1 Feb 12 19:36:13.965048 kernel: SELinux: policy capability extended_socket_class=1 Feb 12 19:36:13.965057 kernel: SELinux: policy capability always_check_network=0 Feb 12 19:36:13.965065 kernel: SELinux: policy capability cgroup_seclabel=1 Feb 12 19:36:13.965073 kernel: SELinux: policy capability nnp_nosuid_transition=1 Feb 12 19:36:13.965081 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Feb 12 19:36:13.965090 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Feb 12 19:36:13.965099 systemd[1]: Successfully loaded SELinux policy in 247.149ms. Feb 12 19:36:13.965109 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 74.041ms. Feb 12 19:36:13.965119 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Feb 12 19:36:13.965130 systemd[1]: Detected virtualization microsoft. Feb 12 19:36:13.965160 systemd[1]: Detected architecture arm64. Feb 12 19:36:13.965170 systemd[1]: Detected first boot. Feb 12 19:36:13.965179 systemd[1]: Hostname set to . Feb 12 19:36:13.965188 systemd[1]: Initializing machine ID from random generator. Feb 12 19:36:13.965197 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:36:13.965206 kernel: audit: type=1400 audit(1707766563.902:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:36:13.965216 kernel: audit: type=1400 audit(1707766563.906:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:36:13.965226 kernel: audit: type=1334 audit(1707766563.908:84): prog-id=10 op=LOAD Feb 12 19:36:13.965235 kernel: audit: type=1334 audit(1707766563.908:85): prog-id=10 op=UNLOAD Feb 12 19:36:13.965243 kernel: audit: type=1334 audit(1707766563.924:86): prog-id=11 op=LOAD Feb 12 19:36:13.965252 kernel: audit: type=1334 audit(1707766563.924:87): prog-id=11 op=UNLOAD Feb 12 19:36:13.965261 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Feb 12 19:36:13.965270 kernel: audit: type=1400 audit(1707766565.427:88): avc: denied { associate } for pid=1101 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:36:13.965281 kernel: audit: type=1300 audit(1707766565.427:88): arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:36:13.965291 kernel: audit: type=1327 audit(1707766565.427:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:36:13.965300 kernel: audit: type=1400 audit(1707766565.441:89): avc: denied { associate } for pid=1101 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:36:13.965310 systemd[1]: Populated /etc with preset unit settings. Feb 12 19:36:13.965319 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:36:13.965329 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:36:13.965339 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:36:13.965348 kernel: kauditd_printk_skb: 5 callbacks suppressed Feb 12 19:36:13.965357 kernel: audit: type=1334 audit(1707766573.237:90): prog-id=12 op=LOAD Feb 12 19:36:13.965366 systemd[1]: initrd-switch-root.service: Deactivated successfully. Feb 12 19:36:13.965375 kernel: audit: type=1334 audit(1707766573.237:91): prog-id=3 op=UNLOAD Feb 12 19:36:13.965386 systemd[1]: Stopped initrd-switch-root.service. Feb 12 19:36:13.965397 kernel: audit: type=1334 audit(1707766573.237:92): prog-id=13 op=LOAD Feb 12 19:36:13.965406 kernel: audit: type=1334 audit(1707766573.237:93): prog-id=14 op=LOAD Feb 12 19:36:13.965416 kernel: audit: type=1334 audit(1707766573.237:94): prog-id=4 op=UNLOAD Feb 12 19:36:13.965424 kernel: audit: type=1334 audit(1707766573.237:95): prog-id=5 op=UNLOAD Feb 12 19:36:13.965433 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Feb 12 19:36:13.965442 kernel: audit: type=1334 audit(1707766573.238:96): prog-id=15 op=LOAD Feb 12 19:36:13.965451 systemd[1]: Created slice system-addon\x2dconfig.slice. Feb 12 19:36:13.965461 kernel: audit: type=1334 audit(1707766573.238:97): prog-id=12 op=UNLOAD Feb 12 19:36:13.965469 kernel: audit: type=1334 audit(1707766573.238:98): prog-id=16 op=LOAD Feb 12 19:36:13.965478 kernel: audit: type=1334 audit(1707766573.238:99): prog-id=17 op=LOAD Feb 12 19:36:13.965487 systemd[1]: Created slice system-addon\x2drun.slice. Feb 12 19:36:13.965497 systemd[1]: Created slice system-getty.slice. Feb 12 19:36:13.965507 systemd[1]: Created slice system-modprobe.slice. Feb 12 19:36:13.965516 systemd[1]: Created slice system-serial\x2dgetty.slice. Feb 12 19:36:13.965526 systemd[1]: Created slice system-system\x2dcloudinit.slice. Feb 12 19:36:13.965535 systemd[1]: Created slice system-systemd\x2dfsck.slice. Feb 12 19:36:13.965545 systemd[1]: Created slice user.slice. Feb 12 19:36:13.965554 systemd[1]: Started systemd-ask-password-console.path. Feb 12 19:36:13.965563 systemd[1]: Started systemd-ask-password-wall.path. Feb 12 19:36:13.965573 systemd[1]: Set up automount boot.automount. Feb 12 19:36:13.965583 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Feb 12 19:36:13.965593 systemd[1]: Stopped target initrd-switch-root.target. Feb 12 19:36:13.965602 systemd[1]: Stopped target initrd-fs.target. Feb 12 19:36:13.965611 systemd[1]: Stopped target initrd-root-fs.target. Feb 12 19:36:13.965620 systemd[1]: Reached target integritysetup.target. Feb 12 19:36:13.965629 systemd[1]: Reached target remote-cryptsetup.target. Feb 12 19:36:13.965639 systemd[1]: Reached target remote-fs.target. Feb 12 19:36:13.965649 systemd[1]: Reached target slices.target. Feb 12 19:36:13.965658 systemd[1]: Reached target swap.target. Feb 12 19:36:13.965668 systemd[1]: Reached target torcx.target. Feb 12 19:36:13.965677 systemd[1]: Reached target veritysetup.target. Feb 12 19:36:13.965687 systemd[1]: Listening on systemd-coredump.socket. Feb 12 19:36:13.965696 systemd[1]: Listening on systemd-initctl.socket. Feb 12 19:36:13.965705 systemd[1]: Listening on systemd-networkd.socket. Feb 12 19:36:13.965716 systemd[1]: Listening on systemd-udevd-control.socket. Feb 12 19:36:13.965726 systemd[1]: Listening on systemd-udevd-kernel.socket. Feb 12 19:36:13.965735 systemd[1]: Listening on systemd-userdbd.socket. Feb 12 19:36:13.965745 systemd[1]: Mounting dev-hugepages.mount... Feb 12 19:36:13.965754 systemd[1]: Mounting dev-mqueue.mount... Feb 12 19:36:13.965763 systemd[1]: Mounting media.mount... Feb 12 19:36:13.965772 systemd[1]: Mounting sys-kernel-debug.mount... Feb 12 19:36:13.965784 systemd[1]: Mounting sys-kernel-tracing.mount... Feb 12 19:36:13.965794 systemd[1]: Mounting tmp.mount... Feb 12 19:36:13.965803 systemd[1]: Starting flatcar-tmpfiles.service... Feb 12 19:36:13.965813 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Feb 12 19:36:13.965822 systemd[1]: Starting kmod-static-nodes.service... Feb 12 19:36:13.965832 systemd[1]: Starting modprobe@configfs.service... Feb 12 19:36:13.965841 systemd[1]: Starting modprobe@dm_mod.service... Feb 12 19:36:13.965850 systemd[1]: Starting modprobe@drm.service... Feb 12 19:36:13.965859 systemd[1]: Starting modprobe@efi_pstore.service... Feb 12 19:36:13.965870 systemd[1]: Starting modprobe@fuse.service... Feb 12 19:36:13.965880 systemd[1]: Starting modprobe@loop.service... Feb 12 19:36:13.965890 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Feb 12 19:36:13.965899 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Feb 12 19:36:13.965909 systemd[1]: Stopped systemd-fsck-root.service. Feb 12 19:36:13.965918 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Feb 12 19:36:13.965927 systemd[1]: Stopped systemd-fsck-usr.service. Feb 12 19:36:13.965937 systemd[1]: Stopped systemd-journald.service. Feb 12 19:36:13.965947 systemd[1]: systemd-journald.service: Consumed 3.214s CPU time. Feb 12 19:36:13.965956 systemd[1]: Starting systemd-journald.service... Feb 12 19:36:13.965966 kernel: fuse: init (API version 7.34) Feb 12 19:36:13.965974 kernel: loop: module loaded Feb 12 19:36:13.965984 systemd[1]: Starting systemd-modules-load.service... Feb 12 19:36:13.965993 systemd[1]: Starting systemd-network-generator.service... Feb 12 19:36:13.966003 systemd[1]: Starting systemd-remount-fs.service... Feb 12 19:36:13.966012 systemd[1]: Starting systemd-udev-trigger.service... Feb 12 19:36:13.966021 systemd[1]: verity-setup.service: Deactivated successfully. Feb 12 19:36:13.966031 systemd[1]: Stopped verity-setup.service. Feb 12 19:36:13.966042 systemd[1]: Mounted dev-hugepages.mount. Feb 12 19:36:13.966051 systemd[1]: Mounted dev-mqueue.mount. Feb 12 19:36:13.966060 systemd[1]: Mounted media.mount. Feb 12 19:36:13.966070 systemd[1]: Mounted sys-kernel-debug.mount. Feb 12 19:36:13.966079 systemd[1]: Mounted sys-kernel-tracing.mount. Feb 12 19:36:13.966088 systemd[1]: Mounted tmp.mount. Feb 12 19:36:13.966098 systemd[1]: Finished flatcar-tmpfiles.service. Feb 12 19:36:13.966107 systemd[1]: Finished kmod-static-nodes.service. Feb 12 19:36:13.966116 systemd[1]: modprobe@configfs.service: Deactivated successfully. Feb 12 19:36:13.966127 systemd[1]: Finished modprobe@configfs.service. Feb 12 19:36:13.966247 systemd-journald[1190]: Journal started Feb 12 19:36:13.966292 systemd-journald[1190]: Runtime Journal (/run/log/journal/88819ff752614b4ca4338da82b805d53) is 8.0M, max 78.6M, 70.6M free. Feb 12 19:36:02.786000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Feb 12 19:36:03.902000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:36:03.906000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Feb 12 19:36:03.908000 audit: BPF prog-id=10 op=LOAD Feb 12 19:36:03.908000 audit: BPF prog-id=10 op=UNLOAD Feb 12 19:36:03.924000 audit: BPF prog-id=11 op=LOAD Feb 12 19:36:03.924000 audit: BPF prog-id=11 op=UNLOAD Feb 12 19:36:05.427000 audit[1101]: AVC avc: denied { associate } for pid=1101 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Feb 12 19:36:05.427000 audit[1101]: SYSCALL arch=c00000b7 syscall=5 success=yes exit=0 a0=400014589c a1=40000c6df8 a2=40000cd0c0 a3=32 items=0 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:36:05.427000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:36:05.441000 audit[1101]: AVC avc: denied { associate } for pid=1101 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Feb 12 19:36:05.441000 audit[1101]: SYSCALL arch=c00000b7 syscall=34 success=yes exit=0 a0=ffffffffffffff9c a1=4000145975 a2=1ed a3=0 items=2 ppid=1084 pid=1101 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:36:05.441000 audit: CWD cwd="/" Feb 12 19:36:05.441000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:05.441000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:05.441000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Feb 12 19:36:13.237000 audit: BPF prog-id=12 op=LOAD Feb 12 19:36:13.237000 audit: BPF prog-id=3 op=UNLOAD Feb 12 19:36:13.237000 audit: BPF prog-id=13 op=LOAD Feb 12 19:36:13.237000 audit: BPF prog-id=14 op=LOAD Feb 12 19:36:13.237000 audit: BPF prog-id=4 op=UNLOAD Feb 12 19:36:13.237000 audit: BPF prog-id=5 op=UNLOAD Feb 12 19:36:13.238000 audit: BPF prog-id=15 op=LOAD Feb 12 19:36:13.238000 audit: BPF prog-id=12 op=UNLOAD Feb 12 19:36:13.238000 audit: BPF prog-id=16 op=LOAD Feb 12 19:36:13.238000 audit: BPF prog-id=17 op=LOAD Feb 12 19:36:13.238000 audit: BPF prog-id=13 op=UNLOAD Feb 12 19:36:13.238000 audit: BPF prog-id=14 op=UNLOAD Feb 12 19:36:13.238000 audit: BPF prog-id=18 op=LOAD Feb 12 19:36:13.238000 audit: BPF prog-id=15 op=UNLOAD Feb 12 19:36:13.238000 audit: BPF prog-id=19 op=LOAD Feb 12 19:36:13.238000 audit: BPF prog-id=20 op=LOAD Feb 12 19:36:13.238000 audit: BPF prog-id=16 op=UNLOAD Feb 12 19:36:13.238000 audit: BPF prog-id=17 op=UNLOAD Feb 12 19:36:13.239000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.273000 audit: BPF prog-id=18 op=UNLOAD Feb 12 19:36:13.288000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.288000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.781000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.791000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.797000 audit: BPF prog-id=21 op=LOAD Feb 12 19:36:13.797000 audit: BPF prog-id=22 op=LOAD Feb 12 19:36:13.797000 audit: BPF prog-id=23 op=LOAD Feb 12 19:36:13.797000 audit: BPF prog-id=19 op=UNLOAD Feb 12 19:36:13.797000 audit: BPF prog-id=20 op=UNLOAD Feb 12 19:36:13.878000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.941000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.951000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.962000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Feb 12 19:36:13.962000 audit[1190]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=60 a0=6 a1=ffffc5074460 a2=4000 a3=1 items=0 ppid=1 pid=1190 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:36:13.962000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Feb 12 19:36:13.235959 systemd[1]: Queued start job for default target multi-user.target. Feb 12 19:36:05.391868 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:36:13.239300 systemd[1]: systemd-journald.service: Deactivated successfully. Feb 12 19:36:05.392191 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:36:13.239630 systemd[1]: systemd-journald.service: Consumed 3.214s CPU time. Feb 12 19:36:05.392210 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:36:05.392246 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Feb 12 19:36:05.392257 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="skipped missing lower profile" missing profile=oem Feb 12 19:36:05.392287 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Feb 12 19:36:05.392299 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Feb 12 19:36:05.392497 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Feb 12 19:36:05.392530 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Feb 12 19:36:05.392542 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Feb 12 19:36:05.406837 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Feb 12 19:36:05.406868 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Feb 12 19:36:05.406887 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.2: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.2 Feb 12 19:36:05.406901 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Feb 12 19:36:05.406918 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.2: no such file or directory" path=/var/lib/torcx/store/3510.3.2 Feb 12 19:36:05.406931 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:05Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Feb 12 19:36:11.897546 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:11Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:36:11.897801 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:11Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:36:11.897891 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:11Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:36:11.898041 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:11Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Feb 12 19:36:11.898088 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:11Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Feb 12 19:36:11.898160 /usr/lib/systemd/system-generators/torcx-generator[1101]: time="2024-02-12T19:36:11Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Feb 12 19:36:13.973000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.973000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.982514 systemd[1]: Started systemd-journald.service. Feb 12 19:36:13.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.983516 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Feb 12 19:36:13.983790 systemd[1]: Finished modprobe@dm_mod.service. Feb 12 19:36:13.988000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.988000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.988897 systemd[1]: modprobe@drm.service: Deactivated successfully. Feb 12 19:36:13.989147 systemd[1]: Finished modprobe@drm.service. Feb 12 19:36:13.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.993000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.994109 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Feb 12 19:36:13.994313 systemd[1]: Finished modprobe@efi_pstore.service. Feb 12 19:36:13.998000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.998000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:13.999314 systemd[1]: modprobe@fuse.service: Deactivated successfully. Feb 12 19:36:13.999587 systemd[1]: Finished modprobe@fuse.service. Feb 12 19:36:14.004000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.004540 systemd[1]: modprobe@loop.service: Deactivated successfully. Feb 12 19:36:14.004722 systemd[1]: Finished modprobe@loop.service. Feb 12 19:36:14.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.009775 systemd[1]: Finished systemd-modules-load.service. Feb 12 19:36:14.014000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.015052 systemd[1]: Finished systemd-network-generator.service. Feb 12 19:36:14.020000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.020714 systemd[1]: Finished systemd-remount-fs.service. Feb 12 19:36:14.025000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.025789 systemd[1]: Finished systemd-udev-trigger.service. Feb 12 19:36:14.030000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.031118 systemd[1]: Reached target network-pre.target. Feb 12 19:36:14.036954 systemd[1]: Mounting sys-fs-fuse-connections.mount... Feb 12 19:36:14.042684 systemd[1]: Mounting sys-kernel-config.mount... Feb 12 19:36:14.046920 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Feb 12 19:36:14.062432 systemd[1]: Starting systemd-hwdb-update.service... Feb 12 19:36:14.067672 systemd[1]: Starting systemd-journal-flush.service... Feb 12 19:36:14.073225 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Feb 12 19:36:14.074381 systemd[1]: Starting systemd-random-seed.service... Feb 12 19:36:14.078795 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Feb 12 19:36:14.079782 systemd[1]: Starting systemd-sysctl.service... Feb 12 19:36:14.084646 systemd[1]: Starting systemd-sysusers.service... Feb 12 19:36:14.089776 systemd[1]: Starting systemd-udev-settle.service... Feb 12 19:36:14.095896 systemd[1]: Mounted sys-fs-fuse-connections.mount. Feb 12 19:36:14.100824 systemd[1]: Mounted sys-kernel-config.mount. Feb 12 19:36:14.106969 udevadm[1221]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Feb 12 19:36:14.141657 systemd[1]: Finished systemd-sysctl.service. Feb 12 19:36:14.146000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.160851 systemd-journald[1190]: Time spent on flushing to /var/log/journal/88819ff752614b4ca4338da82b805d53 is 14.114ms for 1152 entries. Feb 12 19:36:14.160851 systemd-journald[1190]: System Journal (/var/log/journal/88819ff752614b4ca4338da82b805d53) is 8.0M, max 2.6G, 2.6G free. Feb 12 19:36:14.363203 systemd-journald[1190]: Received client request to flush runtime journal. Feb 12 19:36:14.177000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.172537 systemd[1]: Finished systemd-random-seed.service. Feb 12 19:36:14.177671 systemd[1]: Reached target first-boot-complete.target. Feb 12 19:36:14.364229 systemd[1]: Finished systemd-journal-flush.service. Feb 12 19:36:14.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:14.988461 systemd[1]: Finished systemd-sysusers.service. Feb 12 19:36:14.993000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:15.518784 systemd[1]: Finished systemd-hwdb-update.service. Feb 12 19:36:15.523000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:15.524000 audit: BPF prog-id=24 op=LOAD Feb 12 19:36:15.524000 audit: BPF prog-id=25 op=LOAD Feb 12 19:36:15.524000 audit: BPF prog-id=7 op=UNLOAD Feb 12 19:36:15.524000 audit: BPF prog-id=8 op=UNLOAD Feb 12 19:36:15.525123 systemd[1]: Starting systemd-udevd.service... Feb 12 19:36:15.543004 systemd-udevd[1224]: Using default interface naming scheme 'v252'. Feb 12 19:36:15.839964 systemd[1]: Started systemd-udevd.service. Feb 12 19:36:15.848000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:15.850000 audit: BPF prog-id=26 op=LOAD Feb 12 19:36:15.851295 systemd[1]: Starting systemd-networkd.service... Feb 12 19:36:15.877443 systemd[1]: Condition check resulted in dev-ttyAMA0.device being skipped. Feb 12 19:36:15.928308 kernel: mousedev: PS/2 mouse device common for all mice Feb 12 19:36:15.941646 systemd[1]: Starting systemd-userdbd.service... Feb 12 19:36:15.940000 audit: BPF prog-id=27 op=LOAD Feb 12 19:36:15.940000 audit: BPF prog-id=28 op=LOAD Feb 12 19:36:15.940000 audit: BPF prog-id=29 op=LOAD Feb 12 19:36:15.970000 audit[1233]: AVC avc: denied { confidentiality } for pid=1233 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Feb 12 19:36:15.976176 kernel: hv_vmbus: registering driver hv_balloon Feb 12 19:36:15.977379 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Feb 12 19:36:15.986384 kernel: hv_balloon: Memory hot add disabled on ARM64 Feb 12 19:36:15.994155 kernel: hv_vmbus: registering driver hyperv_fb Feb 12 19:36:15.994228 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Feb 12 19:36:16.003230 systemd[1]: Started systemd-userdbd.service. Feb 12 19:36:16.018006 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Feb 12 19:36:16.018109 kernel: hv_utils: Registering HyperV Utility Driver Feb 12 19:36:16.018133 kernel: Console: switching to colour dummy device 80x25 Feb 12 19:36:16.019156 kernel: hv_vmbus: registering driver hv_utils Feb 12 19:36:16.019227 kernel: hv_utils: Shutdown IC version 3.2 Feb 12 19:36:16.019253 kernel: hv_utils: Heartbeat IC version 3.0 Feb 12 19:36:16.019279 kernel: hv_utils: TimeSync IC version 4.0 Feb 12 19:36:16.019000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:16.013711 kernel: Console: switching to colour frame buffer device 128x48 Feb 12 19:36:16.068211 systemd-journald[1190]: Time jumped backwards, rotating. Feb 12 19:36:15.970000 audit[1233]: SYSCALL arch=c00000b7 syscall=105 success=yes exit=0 a0=aaaadfada8a0 a1=aa2c a2=ffff983324b0 a3=aaaadfa39010 items=12 ppid=1224 pid=1233 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:36:15.970000 audit: CWD cwd="/" Feb 12 19:36:15.970000 audit: PATH item=0 name=(null) inode=6555 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=1 name=(null) inode=11420 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=2 name=(null) inode=11420 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=3 name=(null) inode=11421 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=4 name=(null) inode=11420 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=5 name=(null) inode=11422 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=6 name=(null) inode=11420 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=7 name=(null) inode=11423 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=8 name=(null) inode=11420 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=9 name=(null) inode=11424 dev=00:0a mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=10 name=(null) inode=11420 dev=00:0a mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PATH item=11 name=(null) inode=11425 dev=00:0a mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:36:15.970000 audit: PROCTITLE proctitle="(udev-worker)" Feb 12 19:36:16.318555 systemd-networkd[1245]: lo: Link UP Feb 12 19:36:16.318878 systemd-networkd[1245]: lo: Gained carrier Feb 12 19:36:16.319431 systemd-networkd[1245]: Enumeration completed Feb 12 19:36:16.319589 systemd[1]: Started systemd-networkd.service. Feb 12 19:36:16.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:16.337970 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:36:16.345004 systemd-networkd[1245]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:36:16.347767 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1240) Feb 12 19:36:16.362531 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Feb 12 19:36:16.368233 systemd[1]: Finished systemd-udev-settle.service. Feb 12 19:36:16.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:16.374279 systemd[1]: Starting lvm2-activation-early.service... Feb 12 19:36:16.400692 kernel: mlx5_core 0541:00:02.0 enP1345s1: Link up Feb 12 19:36:16.427700 kernel: hv_netvsc 000d3afe-8c46-000d-3afe-8c46000d3afe eth0: Data path switched to VF: enP1345s1 Feb 12 19:36:16.429034 systemd-networkd[1245]: enP1345s1: Link UP Feb 12 19:36:16.429400 systemd-networkd[1245]: eth0: Link UP Feb 12 19:36:16.429409 systemd-networkd[1245]: eth0: Gained carrier Feb 12 19:36:16.433172 systemd-networkd[1245]: enP1345s1: Gained carrier Feb 12 19:36:16.446894 systemd-networkd[1245]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:36:16.737469 lvm[1303]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:36:16.781696 systemd[1]: Finished lvm2-activation-early.service. Feb 12 19:36:16.786000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:16.787064 systemd[1]: Reached target cryptsetup.target. Feb 12 19:36:16.792735 systemd[1]: Starting lvm2-activation.service... Feb 12 19:36:16.796847 lvm[1304]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Feb 12 19:36:16.822694 systemd[1]: Finished lvm2-activation.service. Feb 12 19:36:16.828000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:16.828955 systemd[1]: Reached target local-fs-pre.target. Feb 12 19:36:16.833562 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Feb 12 19:36:16.833589 systemd[1]: Reached target local-fs.target. Feb 12 19:36:16.837905 systemd[1]: Reached target machines.target. Feb 12 19:36:16.843365 systemd[1]: Starting ldconfig.service... Feb 12 19:36:16.859202 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Feb 12 19:36:16.859260 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:36:16.860359 systemd[1]: Starting systemd-boot-update.service... Feb 12 19:36:16.865414 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Feb 12 19:36:16.871806 systemd[1]: Starting systemd-machine-id-commit.service... Feb 12 19:36:16.876401 systemd[1]: systemd-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:36:16.876453 systemd[1]: ensure-sysext.service was skipped because no trigger condition checks were met. Feb 12 19:36:16.877517 systemd[1]: Starting systemd-tmpfiles-setup.service... Feb 12 19:36:16.918773 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1306 (bootctl) Feb 12 19:36:16.919933 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Feb 12 19:36:16.956971 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Feb 12 19:36:16.962000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:17.629809 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Feb 12 19:36:17.630387 systemd[1]: Finished systemd-machine-id-commit.service. Feb 12 19:36:17.634000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:17.664110 systemd-tmpfiles[1309]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Feb 12 19:36:17.748854 systemd-tmpfiles[1309]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Feb 12 19:36:17.775954 systemd-fsck[1314]: fsck.fat 4.2 (2021-01-31) Feb 12 19:36:17.775954 systemd-fsck[1314]: /dev/sda1: 236 files, 113719/258078 clusters Feb 12 19:36:17.778555 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Feb 12 19:36:17.784000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:17.786501 systemd[1]: Mounting boot.mount... Feb 12 19:36:17.800906 systemd[1]: Mounted boot.mount. Feb 12 19:36:17.814090 systemd[1]: Finished systemd-boot-update.service. Feb 12 19:36:17.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:17.851852 systemd-networkd[1245]: eth0: Gained IPv6LL Feb 12 19:36:17.856613 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:36:17.861000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:17.986278 systemd-tmpfiles[1309]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Feb 12 19:36:18.563477 systemd[1]: Finished systemd-tmpfiles-setup.service. Feb 12 19:36:18.568000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.573095 kernel: kauditd_printk_skb: 84 callbacks suppressed Feb 12 19:36:18.573170 kernel: audit: type=1130 audit(1707766578.568:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.574448 systemd[1]: Starting audit-rules.service... Feb 12 19:36:18.595473 systemd[1]: Starting clean-ca-certificates.service... Feb 12 19:36:18.601958 systemd[1]: Starting systemd-journal-catalog-update.service... Feb 12 19:36:18.607000 audit: BPF prog-id=30 op=LOAD Feb 12 19:36:18.609146 systemd[1]: Starting systemd-resolved.service... Feb 12 19:36:18.617212 kernel: audit: type=1334 audit(1707766578.607:168): prog-id=30 op=LOAD Feb 12 19:36:18.617000 audit: BPF prog-id=31 op=LOAD Feb 12 19:36:18.619024 systemd[1]: Starting systemd-timesyncd.service... Feb 12 19:36:18.627762 kernel: audit: type=1334 audit(1707766578.617:169): prog-id=31 op=LOAD Feb 12 19:36:18.629163 systemd[1]: Starting systemd-update-utmp.service... Feb 12 19:36:18.697988 systemd[1]: Finished systemd-journal-catalog-update.service. Feb 12 19:36:18.703000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.716942 systemd[1]: Finished systemd-update-utmp.service. Feb 12 19:36:18.737959 kernel: audit: type=1130 audit(1707766578.703:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.738061 kernel: audit: type=1127 audit(1707766578.713:171): pid=1326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.713000 audit[1326]: SYSTEM_BOOT pid=1326 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.747444 systemd[1]: Started systemd-timesyncd.service. Feb 12 19:36:18.746000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.768831 systemd[1]: Finished clean-ca-certificates.service. Feb 12 19:36:18.767000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.791573 kernel: audit: type=1130 audit(1707766578.746:172): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.791693 kernel: audit: type=1130 audit(1707766578.767:173): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.791000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.809014 kernel: audit: type=1130 audit(1707766578.791:174): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.793221 systemd[1]: Reached target time-set.target. Feb 12 19:36:18.813896 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Feb 12 19:36:18.826714 systemd-resolved[1324]: Positive Trust Anchors: Feb 12 19:36:18.826988 systemd-resolved[1324]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Feb 12 19:36:18.827069 systemd-resolved[1324]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Feb 12 19:36:18.950848 systemd-resolved[1324]: Using system hostname 'ci-3510.3.2-a-04a5975e1d'. Feb 12 19:36:18.952453 systemd[1]: Started systemd-resolved.service. Feb 12 19:36:18.956000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.957241 systemd[1]: Reached target network.target. Feb 12 19:36:18.979160 kernel: audit: type=1130 audit(1707766578.956:175): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:36:18.979580 systemd[1]: Reached target network-online.target. Feb 12 19:36:18.984257 systemd[1]: Reached target nss-lookup.target. Feb 12 19:36:19.063000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:36:19.076323 augenrules[1341]: No rules Feb 12 19:36:19.063000 audit[1341]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffd5ac6d40 a2=420 a3=0 items=0 ppid=1320 pid=1341 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:36:19.076702 kernel: audit: type=1305 audit(1707766579.063:176): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Feb 12 19:36:19.063000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Feb 12 19:36:19.077340 systemd[1]: Finished audit-rules.service. Feb 12 19:36:19.162467 systemd-timesyncd[1325]: Contacted time server 208.113.130.146:123 (0.flatcar.pool.ntp.org). Feb 12 19:36:19.162879 systemd-timesyncd[1325]: Initial clock synchronization to Mon 2024-02-12 19:36:19.165618 UTC. Feb 12 19:36:26.293594 ldconfig[1305]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Feb 12 19:36:26.307207 systemd[1]: Finished ldconfig.service. Feb 12 19:36:26.313099 systemd[1]: Starting systemd-update-done.service... Feb 12 19:36:26.346925 systemd[1]: Finished systemd-update-done.service. Feb 12 19:36:26.351698 systemd[1]: Reached target sysinit.target. Feb 12 19:36:26.355989 systemd[1]: Started motdgen.path. Feb 12 19:36:26.359594 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Feb 12 19:36:26.365763 systemd[1]: Started logrotate.timer. Feb 12 19:36:26.369724 systemd[1]: Started mdadm.timer. Feb 12 19:36:26.373339 systemd[1]: Started systemd-tmpfiles-clean.timer. Feb 12 19:36:26.377977 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Feb 12 19:36:26.378009 systemd[1]: Reached target paths.target. Feb 12 19:36:26.382078 systemd[1]: Reached target timers.target. Feb 12 19:36:26.386674 systemd[1]: Listening on dbus.socket. Feb 12 19:36:26.391541 systemd[1]: Starting docker.socket... Feb 12 19:36:26.410055 systemd[1]: Listening on sshd.socket. Feb 12 19:36:26.414243 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:36:26.414716 systemd[1]: Listening on docker.socket. Feb 12 19:36:26.419473 systemd[1]: Reached target sockets.target. Feb 12 19:36:26.424243 systemd[1]: Reached target basic.target. Feb 12 19:36:26.428358 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:36:26.428388 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Feb 12 19:36:26.429525 systemd[1]: Starting containerd.service... Feb 12 19:36:26.434186 systemd[1]: Starting dbus.service... Feb 12 19:36:26.438251 systemd[1]: Starting enable-oem-cloudinit.service... Feb 12 19:36:26.443347 systemd[1]: Starting extend-filesystems.service... Feb 12 19:36:26.450156 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Feb 12 19:36:26.451184 systemd[1]: Starting motdgen.service... Feb 12 19:36:26.455477 systemd[1]: Started nvidia.service. Feb 12 19:36:26.460490 systemd[1]: Starting prepare-cni-plugins.service... Feb 12 19:36:26.465644 systemd[1]: Starting prepare-critools.service... Feb 12 19:36:26.470480 systemd[1]: Starting prepare-helm.service... Feb 12 19:36:26.475122 systemd[1]: Starting ssh-key-proc-cmdline.service... Feb 12 19:36:26.480266 systemd[1]: Starting sshd-keygen.service... Feb 12 19:36:26.485761 systemd[1]: Starting systemd-logind.service... Feb 12 19:36:26.489684 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Feb 12 19:36:26.489748 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Feb 12 19:36:26.490098 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Feb 12 19:36:26.490735 systemd[1]: Starting update-engine.service... Feb 12 19:36:26.495617 systemd[1]: Starting update-ssh-keys-after-ignition.service... Feb 12 19:36:26.508441 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Feb 12 19:36:26.508610 systemd[1]: Finished ssh-key-proc-cmdline.service. Feb 12 19:36:26.587200 extend-filesystems[1352]: Found sda Feb 12 19:36:26.593976 extend-filesystems[1352]: Found sda1 Feb 12 19:36:26.593976 extend-filesystems[1352]: Found sda2 Feb 12 19:36:26.593976 extend-filesystems[1352]: Found sda3 Feb 12 19:36:26.593976 extend-filesystems[1352]: Found usr Feb 12 19:36:26.593976 extend-filesystems[1352]: Found sda4 Feb 12 19:36:26.593976 extend-filesystems[1352]: Found sda6 Feb 12 19:36:26.593976 extend-filesystems[1352]: Found sda7 Feb 12 19:36:26.593976 extend-filesystems[1352]: Found sda9 Feb 12 19:36:26.593976 extend-filesystems[1352]: Checking size of /dev/sda9 Feb 12 19:36:26.679125 env[1376]: time="2024-02-12T19:36:26.652261374Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Feb 12 19:36:26.679327 jq[1370]: true Feb 12 19:36:26.679458 jq[1351]: false Feb 12 19:36:26.598183 systemd[1]: motdgen.service: Deactivated successfully. Feb 12 19:36:26.598354 systemd[1]: Finished motdgen.service. Feb 12 19:36:26.628300 systemd-logind[1365]: Watching system buttons on /dev/input/event1 (AT Translated Set 2 keyboard) Feb 12 19:36:26.628639 systemd-logind[1365]: New seat seat0. Feb 12 19:36:26.690703 env[1376]: time="2024-02-12T19:36:26.690645391Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Feb 12 19:36:26.690851 env[1376]: time="2024-02-12T19:36:26.690812814Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.692587181Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.148-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.692620545Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.692927508Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.692947231Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.692960072Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.692969874Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.693042644Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.693249993Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.693373930Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Feb 12 19:36:26.693751 env[1376]: time="2024-02-12T19:36:26.693388892Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Feb 12 19:36:26.694120 env[1376]: time="2024-02-12T19:36:26.693438059Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Feb 12 19:36:26.694120 env[1376]: time="2024-02-12T19:36:26.693450101Z" level=info msg="metadata content store policy set" policy=shared Feb 12 19:36:26.701881 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Feb 12 19:36:26.702041 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Feb 12 19:36:26.705595 tar[1372]: ./ Feb 12 19:36:26.705595 tar[1372]: ./loopback Feb 12 19:36:26.707782 env[1376]: time="2024-02-12T19:36:26.707467809Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Feb 12 19:36:26.707782 env[1376]: time="2024-02-12T19:36:26.707508415Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Feb 12 19:36:26.707782 env[1376]: time="2024-02-12T19:36:26.707524257Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Feb 12 19:36:26.707782 env[1376]: time="2024-02-12T19:36:26.707560782Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Feb 12 19:36:26.707782 env[1376]: time="2024-02-12T19:36:26.707576385Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Feb 12 19:36:26.707782 env[1376]: time="2024-02-12T19:36:26.707590546Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Feb 12 19:36:26.707782 env[1376]: time="2024-02-12T19:36:26.707602788Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Feb 12 19:36:26.708002 env[1376]: time="2024-02-12T19:36:26.707975920Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Feb 12 19:36:26.708036 env[1376]: time="2024-02-12T19:36:26.708001924Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Feb 12 19:36:26.708036 env[1376]: time="2024-02-12T19:36:26.708015686Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Feb 12 19:36:26.708036 env[1376]: time="2024-02-12T19:36:26.708028047Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Feb 12 19:36:26.708107 env[1376]: time="2024-02-12T19:36:26.708041089Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Feb 12 19:36:26.708173 env[1376]: time="2024-02-12T19:36:26.708148784Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Feb 12 19:36:26.708252 env[1376]: time="2024-02-12T19:36:26.708230996Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Feb 12 19:36:26.708464 env[1376]: time="2024-02-12T19:36:26.708447386Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Feb 12 19:36:26.708496 env[1376]: time="2024-02-12T19:36:26.708475269Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.708496 env[1376]: time="2024-02-12T19:36:26.708488031Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Feb 12 19:36:26.708537 env[1376]: time="2024-02-12T19:36:26.708530637Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.708559 env[1376]: time="2024-02-12T19:36:26.708543559Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.708559 env[1376]: time="2024-02-12T19:36:26.708555601Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.708600 env[1376]: time="2024-02-12T19:36:26.708566442Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.708600 env[1376]: time="2024-02-12T19:36:26.708579164Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.708600 env[1376]: time="2024-02-12T19:36:26.708591046Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.708658 env[1376]: time="2024-02-12T19:36:26.708602007Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.708658 env[1376]: time="2024-02-12T19:36:26.708613249Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.708658 env[1376]: time="2024-02-12T19:36:26.708626290Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Feb 12 19:36:26.709926 tar[1374]: linux-arm64/helm Feb 12 19:36:26.717827 tar[1373]: crictl Feb 12 19:36:26.718026 env[1376]: time="2024-02-12T19:36:26.716071326Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.718026 env[1376]: time="2024-02-12T19:36:26.716098369Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.718026 env[1376]: time="2024-02-12T19:36:26.716112211Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.718026 env[1376]: time="2024-02-12T19:36:26.716123613Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Feb 12 19:36:26.718026 env[1376]: time="2024-02-12T19:36:26.716138615Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Feb 12 19:36:26.718026 env[1376]: time="2024-02-12T19:36:26.716155137Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Feb 12 19:36:26.718026 env[1376]: time="2024-02-12T19:36:26.716173060Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Feb 12 19:36:26.718026 env[1376]: time="2024-02-12T19:36:26.716207504Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Feb 12 19:36:26.718200 env[1376]: time="2024-02-12T19:36:26.716405092Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Feb 12 19:36:26.718200 env[1376]: time="2024-02-12T19:36:26.716460340Z" level=info msg="Connect containerd service" Feb 12 19:36:26.718200 env[1376]: time="2024-02-12T19:36:26.716489824Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Feb 12 19:36:26.732284 extend-filesystems[1352]: Old size kept for /dev/sda9 Feb 12 19:36:26.745574 extend-filesystems[1352]: Found sr0 Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.741413929Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.741719171Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.741762777Z" level=info msg=serving... address=/run/containerd/containerd.sock Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.756222468Z" level=info msg="Start subscribing containerd event" Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.756275475Z" level=info msg="Start recovering state" Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.756342844Z" level=info msg="Start event monitor" Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.756361727Z" level=info msg="Start snapshots syncer" Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.756371928Z" level=info msg="Start cni network conf syncer for default" Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.756380130Z" level=info msg="Start streaming server" Feb 12 19:36:26.774042 env[1376]: time="2024-02-12T19:36:26.759659025Z" level=info msg="containerd successfully booted in 0.114693s" Feb 12 19:36:26.774290 jq[1407]: true Feb 12 19:36:26.739978 systemd[1]: extend-filesystems.service: Deactivated successfully. Feb 12 19:36:26.740138 systemd[1]: Finished extend-filesystems.service. Feb 12 19:36:26.763023 systemd[1]: Started containerd.service. Feb 12 19:36:26.827150 tar[1372]: ./bandwidth Feb 12 19:36:26.880106 systemd[1]: nvidia.service: Deactivated successfully. Feb 12 19:36:26.923162 tar[1372]: ./ptp Feb 12 19:36:26.958848 bash[1426]: Updated "/home/core/.ssh/authorized_keys" Feb 12 19:36:26.959770 systemd[1]: Finished update-ssh-keys-after-ignition.service. Feb 12 19:36:27.024084 tar[1372]: ./vlan Feb 12 19:36:27.060317 tar[1372]: ./host-device Feb 12 19:36:27.079600 dbus-daemon[1350]: [system] SELinux support is enabled Feb 12 19:36:27.079789 systemd[1]: Started dbus.service. Feb 12 19:36:27.085565 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Feb 12 19:36:27.085591 systemd[1]: Reached target system-config.target. Feb 12 19:36:27.092030 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Feb 12 19:36:27.092051 systemd[1]: Reached target user-config.target. Feb 12 19:36:27.099002 systemd[1]: Started systemd-logind.service. Feb 12 19:36:27.117729 tar[1372]: ./tuning Feb 12 19:36:27.149572 tar[1372]: ./vrf Feb 12 19:36:27.182319 tar[1372]: ./sbr Feb 12 19:36:27.214519 tar[1372]: ./tap Feb 12 19:36:27.252325 tar[1372]: ./dhcp Feb 12 19:36:27.344977 tar[1372]: ./static Feb 12 19:36:27.363903 update_engine[1368]: I0212 19:36:27.340842 1368 main.cc:92] Flatcar Update Engine starting Feb 12 19:36:27.395212 tar[1372]: ./firewall Feb 12 19:36:27.413629 systemd[1]: Started update-engine.service. Feb 12 19:36:27.419994 update_engine[1368]: I0212 19:36:27.419965 1368 update_check_scheduler.cc:74] Next update check in 9m47s Feb 12 19:36:27.421442 systemd[1]: Started locksmithd.service. Feb 12 19:36:27.497514 tar[1372]: ./macvlan Feb 12 19:36:27.593714 tar[1372]: ./dummy Feb 12 19:36:27.610717 systemd[1]: Finished prepare-critools.service. Feb 12 19:36:27.665497 tar[1372]: ./bridge Feb 12 19:36:27.710013 tar[1374]: linux-arm64/LICENSE Feb 12 19:36:27.714149 tar[1374]: linux-arm64/README.md Feb 12 19:36:27.718382 systemd[1]: Finished prepare-helm.service. Feb 12 19:36:27.729301 tar[1372]: ./ipvlan Feb 12 19:36:27.763278 tar[1372]: ./portmap Feb 12 19:36:27.795143 tar[1372]: ./host-local Feb 12 19:36:27.893850 systemd[1]: Finished prepare-cni-plugins.service. Feb 12 19:36:29.113114 locksmithd[1455]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Feb 12 19:36:29.579456 sshd_keygen[1369]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Feb 12 19:36:29.596633 systemd[1]: Finished sshd-keygen.service. Feb 12 19:36:29.602292 systemd[1]: Starting issuegen.service... Feb 12 19:36:29.606752 systemd[1]: Started waagent.service. Feb 12 19:36:29.611271 systemd[1]: issuegen.service: Deactivated successfully. Feb 12 19:36:29.611414 systemd[1]: Finished issuegen.service. Feb 12 19:36:29.616650 systemd[1]: Starting systemd-user-sessions.service... Feb 12 19:36:29.626518 systemd[1]: Finished systemd-user-sessions.service. Feb 12 19:36:29.633161 systemd[1]: Started getty@tty1.service. Feb 12 19:36:29.638533 systemd[1]: Started serial-getty@ttyAMA0.service. Feb 12 19:36:29.643382 systemd[1]: Reached target getty.target. Feb 12 19:36:29.647474 systemd[1]: Reached target multi-user.target. Feb 12 19:36:29.653022 systemd[1]: Starting systemd-update-utmp-runlevel.service... Feb 12 19:36:29.664873 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Feb 12 19:36:29.665020 systemd[1]: Finished systemd-update-utmp-runlevel.service. Feb 12 19:36:29.670384 systemd[1]: Startup finished in 738ms (kernel) + 18.640s (initrd) + 27.414s (userspace) = 46.793s. Feb 12 19:36:30.352008 login[1477]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Feb 12 19:36:30.394856 login[1478]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:36:30.435306 systemd[1]: Created slice user-500.slice. Feb 12 19:36:30.436348 systemd[1]: Starting user-runtime-dir@500.service... Feb 12 19:36:30.438461 systemd-logind[1365]: New session 2 of user core. Feb 12 19:36:30.485012 systemd[1]: Finished user-runtime-dir@500.service. Feb 12 19:36:30.486386 systemd[1]: Starting user@500.service... Feb 12 19:36:30.504070 (systemd)[1481]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:36:30.695253 systemd[1481]: Queued start job for default target default.target. Feb 12 19:36:30.695796 systemd[1481]: Reached target paths.target. Feb 12 19:36:30.695817 systemd[1481]: Reached target sockets.target. Feb 12 19:36:30.695828 systemd[1481]: Reached target timers.target. Feb 12 19:36:30.695838 systemd[1481]: Reached target basic.target. Feb 12 19:36:30.695882 systemd[1481]: Reached target default.target. Feb 12 19:36:30.695908 systemd[1481]: Startup finished in 186ms. Feb 12 19:36:30.695954 systemd[1]: Started user@500.service. Feb 12 19:36:30.696857 systemd[1]: Started session-2.scope. Feb 12 19:36:31.352693 login[1477]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Feb 12 19:36:31.356275 systemd-logind[1365]: New session 1 of user core. Feb 12 19:36:31.357083 systemd[1]: Started session-1.scope. Feb 12 19:36:37.411658 waagent[1474]: 2024-02-12T19:36:37.411543Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Feb 12 19:36:37.418221 waagent[1474]: 2024-02-12T19:36:37.418148Z INFO Daemon Daemon OS: flatcar 3510.3.2 Feb 12 19:36:37.422806 waagent[1474]: 2024-02-12T19:36:37.422749Z INFO Daemon Daemon Python: 3.9.16 Feb 12 19:36:37.427216 waagent[1474]: 2024-02-12T19:36:37.427123Z INFO Daemon Daemon Run daemon Feb 12 19:36:37.431513 waagent[1474]: 2024-02-12T19:36:37.431456Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.2' Feb 12 19:36:37.447935 waagent[1474]: 2024-02-12T19:36:37.447817Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:36:37.462436 waagent[1474]: 2024-02-12T19:36:37.462307Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:36:37.471988 waagent[1474]: 2024-02-12T19:36:37.471924Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:36:37.476946 waagent[1474]: 2024-02-12T19:36:37.476886Z INFO Daemon Daemon Using waagent for provisioning Feb 12 19:36:37.482985 waagent[1474]: 2024-02-12T19:36:37.482925Z INFO Daemon Daemon Activate resource disk Feb 12 19:36:37.487702 waagent[1474]: 2024-02-12T19:36:37.487634Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Feb 12 19:36:37.502142 waagent[1474]: 2024-02-12T19:36:37.502079Z INFO Daemon Daemon Found device: None Feb 12 19:36:37.506637 waagent[1474]: 2024-02-12T19:36:37.506577Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Feb 12 19:36:37.514979 waagent[1474]: 2024-02-12T19:36:37.514918Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Feb 12 19:36:37.527032 waagent[1474]: 2024-02-12T19:36:37.526968Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:36:37.533711 waagent[1474]: 2024-02-12T19:36:37.533631Z INFO Daemon Daemon Running default provisioning handler Feb 12 19:36:37.547168 waagent[1474]: 2024-02-12T19:36:37.547024Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Feb 12 19:36:37.562213 waagent[1474]: 2024-02-12T19:36:37.562077Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Feb 12 19:36:37.571988 waagent[1474]: 2024-02-12T19:36:37.571905Z INFO Daemon Daemon cloud-init is enabled: False Feb 12 19:36:37.577093 waagent[1474]: 2024-02-12T19:36:37.577023Z INFO Daemon Daemon Copying ovf-env.xml Feb 12 19:36:37.603027 waagent[1474]: 2024-02-12T19:36:37.601290Z INFO Daemon Daemon Successfully mounted dvd Feb 12 19:36:37.701381 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Feb 12 19:36:37.720988 waagent[1474]: 2024-02-12T19:36:37.720853Z INFO Daemon Daemon Detect protocol endpoint Feb 12 19:36:37.726199 waagent[1474]: 2024-02-12T19:36:37.726120Z INFO Daemon Daemon Clean protocol and wireserver endpoint Feb 12 19:36:37.732399 waagent[1474]: 2024-02-12T19:36:37.732322Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Feb 12 19:36:37.739304 waagent[1474]: 2024-02-12T19:36:37.739230Z INFO Daemon Daemon Test for route to 168.63.129.16 Feb 12 19:36:37.745185 waagent[1474]: 2024-02-12T19:36:37.745115Z INFO Daemon Daemon Route to 168.63.129.16 exists Feb 12 19:36:37.750913 waagent[1474]: 2024-02-12T19:36:37.750843Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Feb 12 19:36:37.888479 waagent[1474]: 2024-02-12T19:36:37.888403Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Feb 12 19:36:37.895413 waagent[1474]: 2024-02-12T19:36:37.895367Z INFO Daemon Daemon Wire protocol version:2012-11-30 Feb 12 19:36:37.900806 waagent[1474]: 2024-02-12T19:36:37.900746Z INFO Daemon Daemon Server preferred version:2015-04-05 Feb 12 19:36:38.392971 waagent[1474]: 2024-02-12T19:36:38.392811Z INFO Daemon Daemon Initializing goal state during protocol detection Feb 12 19:36:38.408077 waagent[1474]: 2024-02-12T19:36:38.408005Z INFO Daemon Daemon Forcing an update of the goal state.. Feb 12 19:36:38.413911 waagent[1474]: 2024-02-12T19:36:38.413848Z INFO Daemon Daemon Fetching goal state [incarnation 1] Feb 12 19:36:38.486171 waagent[1474]: 2024-02-12T19:36:38.486040Z INFO Daemon Daemon Found private key matching thumbprint AF9026EBA402C6F5BED995E0D252A45B8A196423 Feb 12 19:36:38.494604 waagent[1474]: 2024-02-12T19:36:38.494530Z INFO Daemon Daemon Certificate with thumbprint 086BDB0017694F42CA300A182BAAF64DD80AB776 has no matching private key. Feb 12 19:36:38.503991 waagent[1474]: 2024-02-12T19:36:38.503920Z INFO Daemon Daemon Fetch goal state completed Feb 12 19:36:38.549282 waagent[1474]: 2024-02-12T19:36:38.549223Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: fdc7b0be-3fa7-48e8-b744-4dfdb84c5d28 New eTag: 1600141831642351033] Feb 12 19:36:38.560377 waagent[1474]: 2024-02-12T19:36:38.560299Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:36:38.576569 waagent[1474]: 2024-02-12T19:36:38.576488Z INFO Daemon Daemon Starting provisioning Feb 12 19:36:38.582038 waagent[1474]: 2024-02-12T19:36:38.581971Z INFO Daemon Daemon Handle ovf-env.xml. Feb 12 19:36:38.587278 waagent[1474]: 2024-02-12T19:36:38.587215Z INFO Daemon Daemon Set hostname [ci-3510.3.2-a-04a5975e1d] Feb 12 19:36:38.623295 waagent[1474]: 2024-02-12T19:36:38.623160Z INFO Daemon Daemon Publish hostname [ci-3510.3.2-a-04a5975e1d] Feb 12 19:36:38.630003 waagent[1474]: 2024-02-12T19:36:38.629919Z INFO Daemon Daemon Examine /proc/net/route for primary interface Feb 12 19:36:38.636414 waagent[1474]: 2024-02-12T19:36:38.636347Z INFO Daemon Daemon Primary interface is [eth0] Feb 12 19:36:38.652253 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Feb 12 19:36:38.652426 systemd[1]: Stopped systemd-networkd-wait-online.service. Feb 12 19:36:38.652483 systemd[1]: Stopping systemd-networkd-wait-online.service... Feb 12 19:36:38.652744 systemd[1]: Stopping systemd-networkd.service... Feb 12 19:36:38.656719 systemd-networkd[1245]: eth0: DHCPv6 lease lost Feb 12 19:36:38.658573 systemd[1]: systemd-networkd.service: Deactivated successfully. Feb 12 19:36:38.658771 systemd[1]: Stopped systemd-networkd.service. Feb 12 19:36:38.660910 systemd[1]: Starting systemd-networkd.service... Feb 12 19:36:38.687606 systemd-networkd[1523]: enP1345s1: Link UP Feb 12 19:36:38.687895 systemd-networkd[1523]: enP1345s1: Gained carrier Feb 12 19:36:38.689038 systemd-networkd[1523]: eth0: Link UP Feb 12 19:36:38.689127 systemd-networkd[1523]: eth0: Gained carrier Feb 12 19:36:38.689499 systemd-networkd[1523]: lo: Link UP Feb 12 19:36:38.689564 systemd-networkd[1523]: lo: Gained carrier Feb 12 19:36:38.689921 systemd-networkd[1523]: eth0: Gained IPv6LL Feb 12 19:36:38.690894 systemd-networkd[1523]: Enumeration completed Feb 12 19:36:38.691087 systemd[1]: Started systemd-networkd.service. Feb 12 19:36:38.692515 systemd-networkd[1523]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Feb 12 19:36:38.692780 systemd[1]: Starting systemd-networkd-wait-online.service... Feb 12 19:36:38.696323 waagent[1474]: 2024-02-12T19:36:38.696158Z INFO Daemon Daemon Create user account if not exists Feb 12 19:36:38.702207 waagent[1474]: 2024-02-12T19:36:38.702120Z INFO Daemon Daemon User core already exists, skip useradd Feb 12 19:36:38.708710 waagent[1474]: 2024-02-12T19:36:38.708605Z INFO Daemon Daemon Configure sudoer Feb 12 19:36:38.713911 waagent[1474]: 2024-02-12T19:36:38.713835Z INFO Daemon Daemon Configure sshd Feb 12 19:36:38.718482 waagent[1474]: 2024-02-12T19:36:38.718411Z INFO Daemon Daemon Deploy ssh public key. Feb 12 19:36:38.723751 systemd-networkd[1523]: eth0: DHCPv4 address 10.200.20.13/24, gateway 10.200.20.1 acquired from 168.63.129.16 Feb 12 19:36:38.735601 systemd[1]: Finished systemd-networkd-wait-online.service. Feb 12 19:36:38.768603 waagent[1474]: 2024-02-12T19:36:38.768465Z INFO Daemon Daemon Decode custom data Feb 12 19:36:38.773817 waagent[1474]: 2024-02-12T19:36:38.773739Z INFO Daemon Daemon Save custom data Feb 12 19:36:39.946003 waagent[1474]: 2024-02-12T19:36:39.945909Z INFO Daemon Daemon Provisioning complete Feb 12 19:36:39.966031 waagent[1474]: 2024-02-12T19:36:39.965961Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Feb 12 19:36:39.972500 waagent[1474]: 2024-02-12T19:36:39.972429Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Feb 12 19:36:39.983215 waagent[1474]: 2024-02-12T19:36:39.983139Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Feb 12 19:36:40.281104 waagent[1532]: 2024-02-12T19:36:40.280959Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Feb 12 19:36:40.282181 waagent[1532]: 2024-02-12T19:36:40.282125Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:36:40.282417 waagent[1532]: 2024-02-12T19:36:40.282369Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:36:40.294752 waagent[1532]: 2024-02-12T19:36:40.294685Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Feb 12 19:36:40.295006 waagent[1532]: 2024-02-12T19:36:40.294958Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Feb 12 19:36:40.367023 waagent[1532]: 2024-02-12T19:36:40.366873Z INFO ExtHandler ExtHandler Found private key matching thumbprint AF9026EBA402C6F5BED995E0D252A45B8A196423 Feb 12 19:36:40.367382 waagent[1532]: 2024-02-12T19:36:40.367328Z INFO ExtHandler ExtHandler Certificate with thumbprint 086BDB0017694F42CA300A182BAAF64DD80AB776 has no matching private key. Feb 12 19:36:40.367722 waagent[1532]: 2024-02-12T19:36:40.367653Z INFO ExtHandler ExtHandler Fetch goal state completed Feb 12 19:36:40.381079 waagent[1532]: 2024-02-12T19:36:40.381025Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 2317f96a-0edc-4782-a6f6-b0ce47ab02cc New eTag: 1600141831642351033] Feb 12 19:36:40.381908 waagent[1532]: 2024-02-12T19:36:40.381848Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Feb 12 19:36:40.437978 waagent[1532]: 2024-02-12T19:36:40.437845Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:36:40.448477 waagent[1532]: 2024-02-12T19:36:40.448405Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1532 Feb 12 19:36:40.452309 waagent[1532]: 2024-02-12T19:36:40.452246Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:36:40.453793 waagent[1532]: 2024-02-12T19:36:40.453734Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:36:40.580251 waagent[1532]: 2024-02-12T19:36:40.580140Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:36:40.580863 waagent[1532]: 2024-02-12T19:36:40.580802Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:36:40.589124 waagent[1532]: 2024-02-12T19:36:40.589068Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:36:40.589816 waagent[1532]: 2024-02-12T19:36:40.589758Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:36:40.591084 waagent[1532]: 2024-02-12T19:36:40.591019Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Feb 12 19:36:40.592547 waagent[1532]: 2024-02-12T19:36:40.592478Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:36:40.592867 waagent[1532]: 2024-02-12T19:36:40.592794Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:36:40.593604 waagent[1532]: 2024-02-12T19:36:40.593530Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:36:40.594218 waagent[1532]: 2024-02-12T19:36:40.594152Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:36:40.594542 waagent[1532]: 2024-02-12T19:36:40.594483Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:36:40.594542 waagent[1532]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:36:40.594542 waagent[1532]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:36:40.594542 waagent[1532]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:36:40.594542 waagent[1532]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:36:40.594542 waagent[1532]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:36:40.594542 waagent[1532]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:36:40.596854 waagent[1532]: 2024-02-12T19:36:40.596688Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:36:40.597693 waagent[1532]: 2024-02-12T19:36:40.597607Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:36:40.597898 waagent[1532]: 2024-02-12T19:36:40.597839Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:36:40.598469 waagent[1532]: 2024-02-12T19:36:40.598402Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:36:40.598632 waagent[1532]: 2024-02-12T19:36:40.598582Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:36:40.598781 waagent[1532]: 2024-02-12T19:36:40.598734Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:36:40.599656 waagent[1532]: 2024-02-12T19:36:40.599598Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:36:40.599828 waagent[1532]: 2024-02-12T19:36:40.599756Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:36:40.600547 waagent[1532]: 2024-02-12T19:36:40.600457Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:36:40.600750 waagent[1532]: 2024-02-12T19:36:40.600654Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:36:40.601054 waagent[1532]: 2024-02-12T19:36:40.600987Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:36:40.612011 waagent[1532]: 2024-02-12T19:36:40.611940Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Feb 12 19:36:40.613407 waagent[1532]: 2024-02-12T19:36:40.613351Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:36:40.614444 waagent[1532]: 2024-02-12T19:36:40.614389Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Feb 12 19:36:40.637412 waagent[1532]: 2024-02-12T19:36:40.637283Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1523' Feb 12 19:36:40.676611 waagent[1532]: 2024-02-12T19:36:40.676538Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Feb 12 19:36:40.720448 waagent[1532]: 2024-02-12T19:36:40.720352Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:36:40.720448 waagent[1532]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:36:40.720448 waagent[1532]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:36:40.720448 waagent[1532]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fe:8c:46 brd ff:ff:ff:ff:ff:ff Feb 12 19:36:40.720448 waagent[1532]: 3: enP1345s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fe:8c:46 brd ff:ff:ff:ff:ff:ff\ altname enP1345p0s2 Feb 12 19:36:40.720448 waagent[1532]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:36:40.720448 waagent[1532]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:36:40.720448 waagent[1532]: 2: eth0 inet 10.200.20.13/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:36:40.720448 waagent[1532]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:36:40.720448 waagent[1532]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:36:40.720448 waagent[1532]: 2: eth0 inet6 fe80::20d:3aff:fefe:8c46/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:36:40.786221 waagent[1532]: 2024-02-12T19:36:40.786150Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.9.1.1 -- exiting Feb 12 19:36:40.986629 waagent[1474]: 2024-02-12T19:36:40.986501Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Feb 12 19:36:40.990396 waagent[1474]: 2024-02-12T19:36:40.990339Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.9.1.1 to be the latest agent Feb 12 19:36:42.185480 waagent[1561]: 2024-02-12T19:36:42.185385Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.9.1.1) Feb 12 19:36:42.188099 waagent[1561]: 2024-02-12T19:36:42.188036Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.2 Feb 12 19:36:42.188345 waagent[1561]: 2024-02-12T19:36:42.188297Z INFO ExtHandler ExtHandler Python: 3.9.16 Feb 12 19:36:42.196113 waagent[1561]: 2024-02-12T19:36:42.196017Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.2; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Feb 12 19:36:42.196629 waagent[1561]: 2024-02-12T19:36:42.196575Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:36:42.196905 waagent[1561]: 2024-02-12T19:36:42.196854Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:36:42.209491 waagent[1561]: 2024-02-12T19:36:42.209423Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Feb 12 19:36:42.218058 waagent[1561]: 2024-02-12T19:36:42.218006Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.143 Feb 12 19:36:42.219159 waagent[1561]: 2024-02-12T19:36:42.219103Z INFO ExtHandler Feb 12 19:36:42.219407 waagent[1561]: 2024-02-12T19:36:42.219358Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 2f428e97-f19d-4701-b095-0b1686d0b899 eTag: 1600141831642351033 source: Fabric] Feb 12 19:36:42.220256 waagent[1561]: 2024-02-12T19:36:42.220199Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Feb 12 19:36:42.221582 waagent[1561]: 2024-02-12T19:36:42.221521Z INFO ExtHandler Feb 12 19:36:42.221833 waagent[1561]: 2024-02-12T19:36:42.221784Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Feb 12 19:36:42.230833 waagent[1561]: 2024-02-12T19:36:42.230785Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Feb 12 19:36:42.231381 waagent[1561]: 2024-02-12T19:36:42.231336Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Feb 12 19:36:42.255372 waagent[1561]: 2024-02-12T19:36:42.255311Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Feb 12 19:36:42.324392 waagent[1561]: 2024-02-12T19:36:42.324257Z INFO ExtHandler Downloaded certificate {'thumbprint': 'AF9026EBA402C6F5BED995E0D252A45B8A196423', 'hasPrivateKey': True} Feb 12 19:36:42.325617 waagent[1561]: 2024-02-12T19:36:42.325559Z INFO ExtHandler Downloaded certificate {'thumbprint': '086BDB0017694F42CA300A182BAAF64DD80AB776', 'hasPrivateKey': False} Feb 12 19:36:42.326849 waagent[1561]: 2024-02-12T19:36:42.326788Z INFO ExtHandler Fetch goal state completed Feb 12 19:36:42.348522 waagent[1561]: 2024-02-12T19:36:42.348459Z INFO ExtHandler ExtHandler WALinuxAgent-2.9.1.1 running as process 1561 Feb 12 19:36:42.352136 waagent[1561]: 2024-02-12T19:36:42.352077Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.2', '', 'Flatcar Container Linux by Kinvolk'] Feb 12 19:36:42.353744 waagent[1561]: 2024-02-12T19:36:42.353683Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Feb 12 19:36:42.358564 waagent[1561]: 2024-02-12T19:36:42.358515Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Feb 12 19:36:42.359094 waagent[1561]: 2024-02-12T19:36:42.359036Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Feb 12 19:36:42.367052 waagent[1561]: 2024-02-12T19:36:42.367000Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Feb 12 19:36:42.367616 waagent[1561]: 2024-02-12T19:36:42.367563Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Feb 12 19:36:42.373298 waagent[1561]: 2024-02-12T19:36:42.373204Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Feb 12 19:36:42.377053 waagent[1561]: 2024-02-12T19:36:42.376995Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [True], cgroups enabled [False], python supported: [True] Feb 12 19:36:42.378689 waagent[1561]: 2024-02-12T19:36:42.378605Z INFO ExtHandler ExtHandler Starting env monitor service. Feb 12 19:36:42.379021 waagent[1561]: 2024-02-12T19:36:42.378945Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:36:42.379492 waagent[1561]: 2024-02-12T19:36:42.379427Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:36:42.380113 waagent[1561]: 2024-02-12T19:36:42.380043Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Feb 12 19:36:42.380433 waagent[1561]: 2024-02-12T19:36:42.380374Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Feb 12 19:36:42.380433 waagent[1561]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Feb 12 19:36:42.380433 waagent[1561]: eth0 00000000 0114C80A 0003 0 0 1024 00000000 0 0 0 Feb 12 19:36:42.380433 waagent[1561]: eth0 0014C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Feb 12 19:36:42.380433 waagent[1561]: eth0 0114C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:36:42.380433 waagent[1561]: eth0 10813FA8 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:36:42.380433 waagent[1561]: eth0 FEA9FEA9 0114C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Feb 12 19:36:42.382725 waagent[1561]: 2024-02-12T19:36:42.382594Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Feb 12 19:36:42.383120 waagent[1561]: 2024-02-12T19:36:42.383034Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Feb 12 19:36:42.385034 waagent[1561]: 2024-02-12T19:36:42.383565Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Feb 12 19:36:42.385999 waagent[1561]: 2024-02-12T19:36:42.385885Z INFO EnvHandler ExtHandler Configure routes Feb 12 19:36:42.386288 waagent[1561]: 2024-02-12T19:36:42.386216Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Feb 12 19:36:42.386363 waagent[1561]: 2024-02-12T19:36:42.386311Z INFO EnvHandler ExtHandler Gateway:None Feb 12 19:36:42.386556 waagent[1561]: 2024-02-12T19:36:42.386491Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Feb 12 19:36:42.387227 waagent[1561]: 2024-02-12T19:36:42.387146Z INFO EnvHandler ExtHandler Routes:None Feb 12 19:36:42.390639 waagent[1561]: 2024-02-12T19:36:42.390558Z INFO MonitorHandler ExtHandler Network interfaces: Feb 12 19:36:42.390639 waagent[1561]: Executing ['ip', '-a', '-o', 'link']: Feb 12 19:36:42.390639 waagent[1561]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Feb 12 19:36:42.390639 waagent[1561]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fe:8c:46 brd ff:ff:ff:ff:ff:ff Feb 12 19:36:42.390639 waagent[1561]: 3: enP1345s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 00:0d:3a:fe:8c:46 brd ff:ff:ff:ff:ff:ff\ altname enP1345p0s2 Feb 12 19:36:42.390639 waagent[1561]: Executing ['ip', '-4', '-a', '-o', 'address']: Feb 12 19:36:42.390639 waagent[1561]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Feb 12 19:36:42.390639 waagent[1561]: 2: eth0 inet 10.200.20.13/24 metric 1024 brd 10.200.20.255 scope global eth0\ valid_lft forever preferred_lft forever Feb 12 19:36:42.390639 waagent[1561]: Executing ['ip', '-6', '-a', '-o', 'address']: Feb 12 19:36:42.390639 waagent[1561]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Feb 12 19:36:42.390639 waagent[1561]: 2: eth0 inet6 fe80::20d:3aff:fefe:8c46/64 scope link \ valid_lft forever preferred_lft forever Feb 12 19:36:42.392973 waagent[1561]: 2024-02-12T19:36:42.392813Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Feb 12 19:36:42.393238 waagent[1561]: 2024-02-12T19:36:42.393160Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Feb 12 19:36:42.395098 waagent[1561]: 2024-02-12T19:36:42.395040Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Feb 12 19:36:42.408402 waagent[1561]: 2024-02-12T19:36:42.408331Z INFO ExtHandler ExtHandler No requested version specified, checking for all versions for agent update (family: Prod) Feb 12 19:36:42.408621 waagent[1561]: 2024-02-12T19:36:42.408558Z INFO ExtHandler ExtHandler Downloading manifest Feb 12 19:36:42.439815 waagent[1561]: 2024-02-12T19:36:42.439702Z INFO ExtHandler ExtHandler Feb 12 19:36:42.440257 waagent[1561]: 2024-02-12T19:36:42.440187Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 72025720-2146-44ba-bf4b-9fb3b1d2202c correlation 168db071-a61c-411e-ba3b-9ab527fef2ab created: 2024-02-12T19:34:57.949539Z] Feb 12 19:36:42.443884 waagent[1561]: 2024-02-12T19:36:42.443794Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Feb 12 19:36:42.450480 waagent[1561]: 2024-02-12T19:36:42.450305Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 10 ms] Feb 12 19:36:42.478995 waagent[1561]: 2024-02-12T19:36:42.478923Z INFO ExtHandler ExtHandler Looking for existing remote access users. Feb 12 19:36:42.506599 waagent[1561]: 2024-02-12T19:36:42.506508Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.9.1.1 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: 794CDF4C-E4D9-4C37-8695-D1454230ED12;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1] Feb 12 19:36:42.646403 waagent[1561]: 2024-02-12T19:36:42.646273Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules. Current Firewall rules: Feb 12 19:36:42.646403 waagent[1561]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:36:42.646403 waagent[1561]: pkts bytes target prot opt in out source destination Feb 12 19:36:42.646403 waagent[1561]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:36:42.646403 waagent[1561]: pkts bytes target prot opt in out source destination Feb 12 19:36:42.646403 waagent[1561]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:36:42.646403 waagent[1561]: pkts bytes target prot opt in out source destination Feb 12 19:36:42.646403 waagent[1561]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:36:42.646403 waagent[1561]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:36:42.646403 waagent[1561]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:36:42.653454 waagent[1561]: 2024-02-12T19:36:42.653342Z INFO EnvHandler ExtHandler Current Firewall rules: Feb 12 19:36:42.653454 waagent[1561]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:36:42.653454 waagent[1561]: pkts bytes target prot opt in out source destination Feb 12 19:36:42.653454 waagent[1561]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:36:42.653454 waagent[1561]: pkts bytes target prot opt in out source destination Feb 12 19:36:42.653454 waagent[1561]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Feb 12 19:36:42.653454 waagent[1561]: pkts bytes target prot opt in out source destination Feb 12 19:36:42.653454 waagent[1561]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Feb 12 19:36:42.653454 waagent[1561]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Feb 12 19:36:42.653454 waagent[1561]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Feb 12 19:36:42.653997 waagent[1561]: 2024-02-12T19:36:42.653938Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Feb 12 19:37:04.107472 kernel: hv_balloon: Max. dynamic memory size: 4096 MB Feb 12 19:37:04.836597 systemd[1]: Created slice system-sshd.slice. Feb 12 19:37:04.837726 systemd[1]: Started sshd@0-10.200.20.13:22-10.200.12.6:40592.service. Feb 12 19:37:05.521182 sshd[1616]: Accepted publickey for core from 10.200.12.6 port 40592 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:37:05.555255 sshd[1616]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:37:05.558714 systemd-logind[1365]: New session 3 of user core. Feb 12 19:37:05.559815 systemd[1]: Started session-3.scope. Feb 12 19:37:05.890114 systemd[1]: Started sshd@1-10.200.20.13:22-10.200.12.6:40608.service. Feb 12 19:37:06.334596 sshd[1621]: Accepted publickey for core from 10.200.12.6 port 40608 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:37:06.336209 sshd[1621]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:37:06.340204 systemd[1]: Started session-4.scope. Feb 12 19:37:06.341392 systemd-logind[1365]: New session 4 of user core. Feb 12 19:37:06.662227 sshd[1621]: pam_unix(sshd:session): session closed for user core Feb 12 19:37:06.665121 systemd-logind[1365]: Session 4 logged out. Waiting for processes to exit. Feb 12 19:37:06.665126 systemd[1]: session-4.scope: Deactivated successfully. Feb 12 19:37:06.665908 systemd[1]: sshd@1-10.200.20.13:22-10.200.12.6:40608.service: Deactivated successfully. Feb 12 19:37:06.666897 systemd-logind[1365]: Removed session 4. Feb 12 19:37:06.736682 systemd[1]: Started sshd@2-10.200.20.13:22-10.200.12.6:40622.service. Feb 12 19:37:07.180589 sshd[1627]: Accepted publickey for core from 10.200.12.6 port 40622 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:37:07.181881 sshd[1627]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:37:07.186115 systemd[1]: Started session-5.scope. Feb 12 19:37:07.186415 systemd-logind[1365]: New session 5 of user core. Feb 12 19:37:07.499964 sshd[1627]: pam_unix(sshd:session): session closed for user core Feb 12 19:37:07.502621 systemd[1]: sshd@2-10.200.20.13:22-10.200.12.6:40622.service: Deactivated successfully. Feb 12 19:37:07.503302 systemd[1]: session-5.scope: Deactivated successfully. Feb 12 19:37:07.503834 systemd-logind[1365]: Session 5 logged out. Waiting for processes to exit. Feb 12 19:37:07.504632 systemd-logind[1365]: Removed session 5. Feb 12 19:37:07.569449 systemd[1]: Started sshd@3-10.200.20.13:22-10.200.12.6:53080.service. Feb 12 19:37:07.983727 sshd[1633]: Accepted publickey for core from 10.200.12.6 port 53080 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:37:07.984994 sshd[1633]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:37:07.988822 systemd-logind[1365]: New session 6 of user core. Feb 12 19:37:07.989205 systemd[1]: Started session-6.scope. Feb 12 19:37:08.287353 sshd[1633]: pam_unix(sshd:session): session closed for user core Feb 12 19:37:08.290128 systemd[1]: sshd@3-10.200.20.13:22-10.200.12.6:53080.service: Deactivated successfully. Feb 12 19:37:08.290822 systemd[1]: session-6.scope: Deactivated successfully. Feb 12 19:37:08.291363 systemd-logind[1365]: Session 6 logged out. Waiting for processes to exit. Feb 12 19:37:08.292202 systemd-logind[1365]: Removed session 6. Feb 12 19:37:08.357192 systemd[1]: Started sshd@4-10.200.20.13:22-10.200.12.6:53086.service. Feb 12 19:37:08.770823 sshd[1639]: Accepted publickey for core from 10.200.12.6 port 53086 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:37:08.772105 sshd[1639]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:37:08.776492 systemd[1]: Started session-7.scope. Feb 12 19:37:08.777482 systemd-logind[1365]: New session 7 of user core. Feb 12 19:37:09.285761 sudo[1642]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Feb 12 19:37:09.285963 sudo[1642]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:37:09.352859 dbus-daemon[1350]: avc: received setenforce notice (enforcing=1) Feb 12 19:37:09.354655 sudo[1642]: pam_unix(sudo:session): session closed for user root Feb 12 19:37:09.433312 sshd[1639]: pam_unix(sshd:session): session closed for user core Feb 12 19:37:09.436459 systemd-logind[1365]: Session 7 logged out. Waiting for processes to exit. Feb 12 19:37:09.436815 systemd[1]: sshd@4-10.200.20.13:22-10.200.12.6:53086.service: Deactivated successfully. Feb 12 19:37:09.437517 systemd[1]: session-7.scope: Deactivated successfully. Feb 12 19:37:09.438390 systemd-logind[1365]: Removed session 7. Feb 12 19:37:09.502682 systemd[1]: Started sshd@5-10.200.20.13:22-10.200.12.6:53094.service. Feb 12 19:37:09.916079 sshd[1646]: Accepted publickey for core from 10.200.12.6 port 53094 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:37:09.917404 sshd[1646]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:37:09.921138 systemd-logind[1365]: New session 8 of user core. Feb 12 19:37:09.921560 systemd[1]: Started session-8.scope. Feb 12 19:37:10.153940 sudo[1650]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Feb 12 19:37:10.154142 sudo[1650]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:37:10.156605 sudo[1650]: pam_unix(sudo:session): session closed for user root Feb 12 19:37:10.160855 sudo[1649]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Feb 12 19:37:10.161044 sudo[1649]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:37:10.169443 systemd[1]: Stopping audit-rules.service... Feb 12 19:37:10.170000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:37:10.174804 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:37:10.174884 kernel: audit: type=1305 audit(1707766630.170:177): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Feb 12 19:37:10.185951 auditctl[1653]: No rules Feb 12 19:37:10.170000 audit[1653]: SYSCALL arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdf17adb0 a2=420 a3=0 items=0 ppid=1 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:10.186375 systemd[1]: audit-rules.service: Deactivated successfully. Feb 12 19:37:10.186563 systemd[1]: Stopped audit-rules.service. Feb 12 19:37:10.188284 systemd[1]: Starting audit-rules.service... Feb 12 19:37:10.209545 kernel: audit: type=1300 audit(1707766630.170:177): arch=c00000b7 syscall=206 success=yes exit=1056 a0=3 a1=ffffdf17adb0 a2=420 a3=0 items=0 ppid=1 pid=1653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:10.170000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:37:10.216772 kernel: audit: type=1327 audit(1707766630.170:177): proctitle=2F7362696E2F617564697463746C002D44 Feb 12 19:37:10.185000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.233159 kernel: audit: type=1131 audit(1707766630.185:178): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.241613 augenrules[1670]: No rules Feb 12 19:37:10.242537 systemd[1]: Finished audit-rules.service. Feb 12 19:37:10.242000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.244418 sudo[1649]: pam_unix(sudo:session): session closed for user root Feb 12 19:37:10.243000 audit[1649]: USER_END pid=1649 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.278514 kernel: audit: type=1130 audit(1707766630.242:179): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.278623 kernel: audit: type=1106 audit(1707766630.243:180): pid=1649 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.278726 kernel: audit: type=1104 audit(1707766630.243:181): pid=1649 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.243000 audit[1649]: CRED_DISP pid=1649 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.324398 sshd[1646]: pam_unix(sshd:session): session closed for user core Feb 12 19:37:10.324000 audit[1646]: USER_END pid=1646 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:10.327585 systemd-logind[1365]: Session 8 logged out. Waiting for processes to exit. Feb 12 19:37:10.328150 systemd[1]: session-8.scope: Deactivated successfully. Feb 12 19:37:10.328726 systemd[1]: sshd@5-10.200.20.13:22-10.200.12.6:53094.service: Deactivated successfully. Feb 12 19:37:10.330123 systemd-logind[1365]: Removed session 8. Feb 12 19:37:10.324000 audit[1646]: CRED_DISP pid=1646 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:10.366762 kernel: audit: type=1106 audit(1707766630.324:182): pid=1646 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:10.366858 kernel: audit: type=1104 audit(1707766630.324:183): pid=1646 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:10.366886 kernel: audit: type=1131 audit(1707766630.324:184): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.13:22-10.200.12.6:53094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.324000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.20.13:22-10.200.12.6:53094 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.404579 systemd[1]: Started sshd@6-10.200.20.13:22-10.200.12.6:53110.service. Feb 12 19:37:10.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.12.6:53110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:10.821000 audit[1676]: USER_ACCT pid=1676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:10.822629 sshd[1676]: Accepted publickey for core from 10.200.12.6 port 53110 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:37:10.822000 audit[1676]: CRED_ACQ pid=1676 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:10.822000 audit[1676]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff421b790 a2=3 a3=1 items=0 ppid=1 pid=1676 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:10.822000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:37:10.826375 sshd[1676]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:37:10.830532 systemd[1]: Started session-9.scope. Feb 12 19:37:10.830941 systemd-logind[1365]: New session 9 of user core. Feb 12 19:37:10.834000 audit[1676]: USER_START pid=1676 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:10.835000 audit[1678]: CRED_ACQ pid=1678 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:11.061000 audit[1679]: USER_ACCT pid=1679 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:11.062520 sudo[1679]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Feb 12 19:37:11.061000 audit[1679]: CRED_REFR pid=1679 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:11.062749 sudo[1679]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Feb 12 19:37:11.063000 audit[1679]: USER_START pid=1679 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:12.380441 systemd[1]: Starting docker.service... Feb 12 19:37:12.446347 env[1694]: time="2024-02-12T19:37:12.446286517Z" level=info msg="Starting up" Feb 12 19:37:12.447696 env[1694]: time="2024-02-12T19:37:12.447642606Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:37:12.447797 env[1694]: time="2024-02-12T19:37:12.447782807Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:37:12.447872 env[1694]: time="2024-02-12T19:37:12.447856568Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:37:12.447922 env[1694]: time="2024-02-12T19:37:12.447910448Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:37:12.450314 env[1694]: time="2024-02-12T19:37:12.450290465Z" level=info msg="parsed scheme: \"unix\"" module=grpc Feb 12 19:37:12.450405 env[1694]: time="2024-02-12T19:37:12.450391666Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Feb 12 19:37:12.450466 env[1694]: time="2024-02-12T19:37:12.450453106Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Feb 12 19:37:12.450522 env[1694]: time="2024-02-12T19:37:12.450510267Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Feb 12 19:37:12.454796 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport1164039690-merged.mount: Deactivated successfully. Feb 12 19:37:12.557370 env[1694]: time="2024-02-12T19:37:12.557168189Z" level=info msg="Loading containers: start." Feb 12 19:37:12.674000 audit[1722]: NETFILTER_CFG table=nat:5 family=2 entries=2 op=nft_register_chain pid=1722 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.674000 audit[1722]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=116 a0=3 a1=ffffd4646120 a2=0 a3=1 items=0 ppid=1694 pid=1722 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.674000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Feb 12 19:37:12.676000 audit[1724]: NETFILTER_CFG table=filter:6 family=2 entries=2 op=nft_register_chain pid=1724 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.676000 audit[1724]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=124 a0=3 a1=ffffc6fedf80 a2=0 a3=1 items=0 ppid=1694 pid=1724 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.676000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Feb 12 19:37:12.678000 audit[1726]: NETFILTER_CFG table=filter:7 family=2 entries=1 op=nft_register_chain pid=1726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.678000 audit[1726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe5b0c900 a2=0 a3=1 items=0 ppid=1694 pid=1726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.678000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:37:12.679000 audit[1728]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1728 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.679000 audit[1728]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=112 a0=3 a1=ffffe31484e0 a2=0 a3=1 items=0 ppid=1694 pid=1728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.679000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:37:12.681000 audit[1730]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_rule pid=1730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.681000 audit[1730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffb67e530 a2=0 a3=1 items=0 ppid=1694 pid=1730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.681000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Feb 12 19:37:12.683000 audit[1732]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.683000 audit[1732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffdcca74c0 a2=0 a3=1 items=0 ppid=1694 pid=1732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.683000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Feb 12 19:37:12.702000 audit[1734]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1734 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.702000 audit[1734]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=fffff729ab70 a2=0 a3=1 items=0 ppid=1694 pid=1734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.702000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Feb 12 19:37:12.704000 audit[1736]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.704000 audit[1736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=212 a0=3 a1=ffffe8ec76e0 a2=0 a3=1 items=0 ppid=1694 pid=1736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.704000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Feb 12 19:37:12.706000 audit[1738]: NETFILTER_CFG table=filter:13 family=2 entries=2 op=nft_register_chain pid=1738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.706000 audit[1738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=308 a0=3 a1=ffffe95d9ad0 a2=0 a3=1 items=0 ppid=1694 pid=1738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.706000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:37:12.727000 audit[1742]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_unregister_rule pid=1742 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.727000 audit[1742]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=216 a0=3 a1=ffffd0db0940 a2=0 a3=1 items=0 ppid=1694 pid=1742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.727000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:37:12.728000 audit[1743]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1743 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:12.728000 audit[1743]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=ffffc8a37c90 a2=0 a3=1 items=0 ppid=1694 pid=1743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:12.728000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:37:12.810762 kernel: Initializing XFRM netlink socket Feb 12 19:37:12.839499 env[1694]: time="2024-02-12T19:37:12.839462845Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Feb 12 19:37:12.877702 update_engine[1368]: I0212 19:37:12.877521 1368 update_attempter.cc:509] Updating boot flags... Feb 12 19:37:13.081000 audit[1816]: NETFILTER_CFG table=nat:16 family=2 entries=2 op=nft_register_chain pid=1816 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.081000 audit[1816]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=492 a0=3 a1=ffffdd5e8c20 a2=0 a3=1 items=0 ppid=1694 pid=1816 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.081000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Feb 12 19:37:13.102000 audit[1819]: NETFILTER_CFG table=nat:17 family=2 entries=1 op=nft_register_rule pid=1819 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.102000 audit[1819]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=288 a0=3 a1=ffffc4a53090 a2=0 a3=1 items=0 ppid=1694 pid=1819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.102000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Feb 12 19:37:13.105000 audit[1822]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1822 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.105000 audit[1822]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffc3e61940 a2=0 a3=1 items=0 ppid=1694 pid=1822 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.105000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Feb 12 19:37:13.107000 audit[1824]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1824 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.107000 audit[1824]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=376 a0=3 a1=ffffd9806420 a2=0 a3=1 items=0 ppid=1694 pid=1824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.107000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Feb 12 19:37:13.108000 audit[1826]: NETFILTER_CFG table=nat:20 family=2 entries=2 op=nft_register_chain pid=1826 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.108000 audit[1826]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=356 a0=3 a1=ffffd7a32620 a2=0 a3=1 items=0 ppid=1694 pid=1826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.108000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Feb 12 19:37:13.110000 audit[1828]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1828 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.110000 audit[1828]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=444 a0=3 a1=ffffebc19160 a2=0 a3=1 items=0 ppid=1694 pid=1828 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.110000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Feb 12 19:37:13.112000 audit[1830]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1830 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.112000 audit[1830]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=304 a0=3 a1=fffff319c1f0 a2=0 a3=1 items=0 ppid=1694 pid=1830 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.112000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Feb 12 19:37:13.114000 audit[1832]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1832 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.114000 audit[1832]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=508 a0=3 a1=ffffff666630 a2=0 a3=1 items=0 ppid=1694 pid=1832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.114000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Feb 12 19:37:13.116000 audit[1834]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1834 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.116000 audit[1834]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=240 a0=3 a1=ffffce7cbc60 a2=0 a3=1 items=0 ppid=1694 pid=1834 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.116000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Feb 12 19:37:13.118000 audit[1836]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1836 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.118000 audit[1836]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=428 a0=3 a1=ffffea06fcd0 a2=0 a3=1 items=0 ppid=1694 pid=1836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.118000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Feb 12 19:37:13.120000 audit[1838]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1838 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.120000 audit[1838]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffe4772900 a2=0 a3=1 items=0 ppid=1694 pid=1838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.120000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Feb 12 19:37:13.121661 systemd-networkd[1523]: docker0: Link UP Feb 12 19:37:13.140000 audit[1842]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_unregister_rule pid=1842 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.140000 audit[1842]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=fffffa31a4b0 a2=0 a3=1 items=0 ppid=1694 pid=1842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.140000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:37:13.141000 audit[1843]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1843 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:13.141000 audit[1843]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=224 a0=3 a1=fffff9bf6f60 a2=0 a3=1 items=0 ppid=1694 pid=1843 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:13.141000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Feb 12 19:37:13.142904 env[1694]: time="2024-02-12T19:37:13.142876428Z" level=info msg="Loading containers: done." Feb 12 19:37:13.154098 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck646872290-merged.mount: Deactivated successfully. Feb 12 19:37:13.189790 env[1694]: time="2024-02-12T19:37:13.189747262Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Feb 12 19:37:13.190147 env[1694]: time="2024-02-12T19:37:13.190124065Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Feb 12 19:37:13.190330 env[1694]: time="2024-02-12T19:37:13.190310866Z" level=info msg="Daemon has completed initialization" Feb 12 19:37:13.225917 systemd[1]: Started docker.service. Feb 12 19:37:13.225000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:13.233774 env[1694]: time="2024-02-12T19:37:13.233717037Z" level=info msg="API listen on /run/docker.sock" Feb 12 19:37:13.250515 systemd[1]: Reloading. Feb 12 19:37:13.311460 /usr/lib/systemd/system-generators/torcx-generator[1891]: time="2024-02-12T19:37:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:37:13.311497 /usr/lib/systemd/system-generators/torcx-generator[1891]: time="2024-02-12T19:37:13Z" level=info msg="torcx already run" Feb 12 19:37:13.381955 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:37:13.381979 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:37:13.398060 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:37:13.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.463000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.463000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit: BPF prog-id=38 op=LOAD Feb 12 19:37:13.464000 audit: BPF prog-id=21 op=UNLOAD Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit: BPF prog-id=39 op=LOAD Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.464000 audit: BPF prog-id=40 op=LOAD Feb 12 19:37:13.464000 audit: BPF prog-id=22 op=UNLOAD Feb 12 19:37:13.464000 audit: BPF prog-id=23 op=UNLOAD Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit: BPF prog-id=41 op=LOAD Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.465000 audit: BPF prog-id=42 op=LOAD Feb 12 19:37:13.465000 audit: BPF prog-id=24 op=UNLOAD Feb 12 19:37:13.465000 audit: BPF prog-id=25 op=UNLOAD Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit: BPF prog-id=43 op=LOAD Feb 12 19:37:13.466000 audit: BPF prog-id=32 op=UNLOAD Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit: BPF prog-id=44 op=LOAD Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.466000 audit: BPF prog-id=45 op=LOAD Feb 12 19:37:13.466000 audit: BPF prog-id=33 op=UNLOAD Feb 12 19:37:13.466000 audit: BPF prog-id=34 op=UNLOAD Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.468000 audit: BPF prog-id=46 op=LOAD Feb 12 19:37:13.468000 audit: BPF prog-id=35 op=UNLOAD Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.469000 audit: BPF prog-id=47 op=LOAD Feb 12 19:37:13.469000 audit: BPF prog-id=30 op=UNLOAD Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.470000 audit: BPF prog-id=48 op=LOAD Feb 12 19:37:13.470000 audit: BPF prog-id=37 op=UNLOAD Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit: BPF prog-id=49 op=LOAD Feb 12 19:37:13.471000 audit: BPF prog-id=27 op=UNLOAD Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.471000 audit: BPF prog-id=50 op=LOAD Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit: BPF prog-id=51 op=LOAD Feb 12 19:37:13.472000 audit: BPF prog-id=28 op=UNLOAD Feb 12 19:37:13.472000 audit: BPF prog-id=29 op=UNLOAD Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:13.472000 audit: BPF prog-id=52 op=LOAD Feb 12 19:37:13.472000 audit: BPF prog-id=31 op=UNLOAD Feb 12 19:37:13.479000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:13.479849 systemd[1]: Started kubelet.service. Feb 12 19:37:13.548584 kubelet[1950]: E0212 19:37:13.548529 1950 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:37:13.550648 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:37:13.550802 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:37:13.550000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:37:18.063033 env[1376]: time="2024-02-12T19:37:18.062972853Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\"" Feb 12 19:37:18.886709 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2288008221.mount: Deactivated successfully. Feb 12 19:37:21.520310 env[1376]: time="2024-02-12T19:37:21.520250766Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:21.528101 env[1376]: time="2024-02-12T19:37:21.528059318Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:21.533903 env[1376]: time="2024-02-12T19:37:21.533868581Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:21.540756 env[1376]: time="2024-02-12T19:37:21.540727248Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:98a686df810b9f1de8e3b2ae869e79c51a36e7434d33c53f011852618aec0a68,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:21.541510 env[1376]: time="2024-02-12T19:37:21.541482651Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.28.6\" returns image reference \"sha256:68142d88471bf00b1317307442bd31edbbc7532061d623e85659df2d417308fb\"" Feb 12 19:37:21.550937 env[1376]: time="2024-02-12T19:37:21.550900329Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\"" Feb 12 19:37:23.678168 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Feb 12 19:37:23.678350 systemd[1]: Stopped kubelet.service. Feb 12 19:37:23.684029 kernel: kauditd_printk_skb: 258 callbacks suppressed Feb 12 19:37:23.684158 kernel: audit: type=1130 audit(1707766643.677:393): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:23.677000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:23.679882 systemd[1]: Started kubelet.service. Feb 12 19:37:23.677000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:23.714175 kernel: audit: type=1131 audit(1707766643.677:394): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:23.714301 kernel: audit: type=1130 audit(1707766643.679:395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:23.679000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:23.757993 kubelet[1973]: E0212 19:37:23.757940 1973 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:37:23.760000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:37:23.761039 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:37:23.761169 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:37:23.779690 kernel: audit: type=1131 audit(1707766643.760:396): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:37:24.716275 env[1376]: time="2024-02-12T19:37:24.715550012Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:24.724401 env[1376]: time="2024-02-12T19:37:24.724359130Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:24.732784 env[1376]: time="2024-02-12T19:37:24.732743869Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:24.737321 env[1376]: time="2024-02-12T19:37:24.737286475Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:80bdcd72cfe26028bb2fed75732fc2f511c35fa8d1edc03deae11f3490713c9e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:24.738069 env[1376]: time="2024-02-12T19:37:24.738040937Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.28.6\" returns image reference \"sha256:8dbd4fd1241644100b94eb40a9d284c5cf08fa7f2d15cafdf1ca8cec8443b31f\"" Feb 12 19:37:24.747429 env[1376]: time="2024-02-12T19:37:24.747394807Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\"" Feb 12 19:37:26.622877 env[1376]: time="2024-02-12T19:37:26.622821061Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:26.634124 env[1376]: time="2024-02-12T19:37:26.634078147Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:26.642907 env[1376]: time="2024-02-12T19:37:26.642866064Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:26.648214 env[1376]: time="2024-02-12T19:37:26.648174078Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:a89db556c34d652d403d909882dbd97336f2e935b1c726b2e2b2c0400186ac39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:26.648990 env[1376]: time="2024-02-12T19:37:26.648959463Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.28.6\" returns image reference \"sha256:541cddf10a6c9bb71f141eeefea4203714984b67ec3582fb4538058af9e43663\"" Feb 12 19:37:26.657682 env[1376]: time="2024-02-12T19:37:26.657634085Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\"" Feb 12 19:37:28.132898 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2825396470.mount: Deactivated successfully. Feb 12 19:37:28.895990 env[1376]: time="2024-02-12T19:37:28.895937800Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:28.902043 env[1376]: time="2024-02-12T19:37:28.902012197Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:28.906633 env[1376]: time="2024-02-12T19:37:28.906603707Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.28.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:28.910498 env[1376]: time="2024-02-12T19:37:28.910472610Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:3898a1671ae42be1cd3c2e777549bc7b5b306b8da3a224b747365f6679fb902a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:28.910978 env[1376]: time="2024-02-12T19:37:28.910948349Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.28.6\" returns image reference \"sha256:2d8b4f784b5f439fa536676861ad1144130a981e5ac011d08829ed921477ec74\"" Feb 12 19:37:28.921408 env[1376]: time="2024-02-12T19:37:28.921376227Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Feb 12 19:37:29.523969 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2942393733.mount: Deactivated successfully. Feb 12 19:37:29.549311 env[1376]: time="2024-02-12T19:37:29.549267400Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:29.558379 env[1376]: time="2024-02-12T19:37:29.558336777Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:29.564742 env[1376]: time="2024-02-12T19:37:29.564712627Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:29.571903 env[1376]: time="2024-02-12T19:37:29.571864397Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:29.572493 env[1376]: time="2024-02-12T19:37:29.572466034Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:829e9de338bd5fdd3f16f68f83a9fb288fbc8453e881e5d5cfd0f6f2ff72b43e\"" Feb 12 19:37:29.581033 env[1376]: time="2024-02-12T19:37:29.581001040Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\"" Feb 12 19:37:30.304467 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2801881019.mount: Deactivated successfully. Feb 12 19:37:33.928179 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Feb 12 19:37:33.928363 systemd[1]: Stopped kubelet.service. Feb 12 19:37:33.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:33.929884 systemd[1]: Started kubelet.service. Feb 12 19:37:33.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:33.964077 kernel: audit: type=1130 audit(1707766653.927:397): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:33.964254 kernel: audit: type=1131 audit(1707766653.927:398): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:33.964333 kernel: audit: type=1130 audit(1707766653.928:399): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:33.928000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:34.021241 kubelet[1999]: E0212 19:37:34.021175 1999 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Feb 12 19:37:34.023000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:37:34.023551 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Feb 12 19:37:34.023697 systemd[1]: kubelet.service: Failed with result 'exit-code'. Feb 12 19:37:34.041698 kernel: audit: type=1131 audit(1707766654.023:400): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Feb 12 19:37:36.753418 env[1376]: time="2024-02-12T19:37:36.753371767Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:36.761938 env[1376]: time="2024-02-12T19:37:36.761899360Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:36.766283 env[1376]: time="2024-02-12T19:37:36.766256820Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.9-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:36.770631 env[1376]: time="2024-02-12T19:37:36.770605082Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:e013d0d5e4e25d00c61a7ff839927a1f36479678f11e49502b53a5e0b14f10c3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:36.771531 env[1376]: time="2024-02-12T19:37:36.771486493Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.9-0\" returns image reference \"sha256:9cdd6470f48c8b127530b7ce6ea4b3524137984481e48bcde619735890840ace\"" Feb 12 19:37:36.781713 env[1376]: time="2024-02-12T19:37:36.781662085Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\"" Feb 12 19:37:37.551164 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3163265719.mount: Deactivated successfully. Feb 12 19:37:38.224286 env[1376]: time="2024-02-12T19:37:38.224234987Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:38.232275 env[1376]: time="2024-02-12T19:37:38.232224381Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:38.237374 env[1376]: time="2024-02-12T19:37:38.237334599Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.10.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:38.242196 env[1376]: time="2024-02-12T19:37:38.242158503Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:a0ead06651cf580044aeb0a0feba63591858fb2e43ade8c9dea45a6a89ae7e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:38.242814 env[1376]: time="2024-02-12T19:37:38.242778803Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.10.1\" returns image reference \"sha256:97e04611ad43405a2e5863ae17c6f1bc9181bdefdaa78627c432ef754a4eb108\"" Feb 12 19:37:43.615562 systemd[1]: Stopped kubelet.service. Feb 12 19:37:43.614000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:43.614000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:43.652021 kernel: audit: type=1130 audit(1707766663.614:401): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:43.652105 kernel: audit: type=1131 audit(1707766663.614:402): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:43.666307 systemd[1]: Reloading. Feb 12 19:37:43.767855 /usr/lib/systemd/system-generators/torcx-generator[2095]: time="2024-02-12T19:37:43Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:37:43.769851 /usr/lib/systemd/system-generators/torcx-generator[2095]: time="2024-02-12T19:37:43Z" level=info msg="torcx already run" Feb 12 19:37:43.821460 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:37:43.821644 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:37:43.836934 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:37:43.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.939660 kernel: audit: type=1400 audit(1707766663.903:403): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.939789 kernel: audit: type=1400 audit(1707766663.903:404): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.939824 kernel: audit: type=1400 audit(1707766663.903:405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.973525 kernel: audit: type=1400 audit(1707766663.903:406): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.990508 kernel: audit: type=1400 audit(1707766663.903:407): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.990617 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Feb 12 19:37:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.012694 kernel: audit: type=1400 audit(1707766663.903:408): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.012821 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Feb 12 19:37:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.903000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.903000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit: BPF prog-id=53 op=LOAD Feb 12 19:37:43.920000 audit: BPF prog-id=38 op=UNLOAD Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit: BPF prog-id=54 op=LOAD Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.920000 audit: BPF prog-id=55 op=LOAD Feb 12 19:37:43.920000 audit: BPF prog-id=39 op=UNLOAD Feb 12 19:37:43.920000 audit: BPF prog-id=40 op=UNLOAD Feb 12 19:37:43.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.922000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.922000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.938000 audit: BPF prog-id=56 op=LOAD Feb 12 19:37:43.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.938000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.938000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.955000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.955000 audit: BPF prog-id=57 op=LOAD Feb 12 19:37:43.955000 audit: BPF prog-id=41 op=UNLOAD Feb 12 19:37:43.955000 audit: BPF prog-id=42 op=UNLOAD Feb 12 19:37:43.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.956000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.956000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.971000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.971000 audit: BPF prog-id=58 op=LOAD Feb 12 19:37:43.972000 audit: BPF prog-id=43 op=UNLOAD Feb 12 19:37:43.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:43.972000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit: BPF prog-id=59 op=LOAD Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.018000 audit: BPF prog-id=60 op=LOAD Feb 12 19:37:44.018000 audit: BPF prog-id=44 op=UNLOAD Feb 12 19:37:44.018000 audit: BPF prog-id=45 op=UNLOAD Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.019000 audit: BPF prog-id=61 op=LOAD Feb 12 19:37:44.019000 audit: BPF prog-id=46 op=UNLOAD Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit: BPF prog-id=62 op=LOAD Feb 12 19:37:44.020000 audit: BPF prog-id=47 op=UNLOAD Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.020000 audit: BPF prog-id=63 op=LOAD Feb 12 19:37:44.020000 audit: BPF prog-id=48 op=UNLOAD Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit: BPF prog-id=64 op=LOAD Feb 12 19:37:44.022000 audit: BPF prog-id=49 op=UNLOAD Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit: BPF prog-id=65 op=LOAD Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.022000 audit: BPF prog-id=66 op=LOAD Feb 12 19:37:44.022000 audit: BPF prog-id=50 op=UNLOAD Feb 12 19:37:44.022000 audit: BPF prog-id=51 op=UNLOAD Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:44.023000 audit: BPF prog-id=67 op=LOAD Feb 12 19:37:44.023000 audit: BPF prog-id=52 op=UNLOAD Feb 12 19:37:44.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:44.038389 systemd[1]: Started kubelet.service. Feb 12 19:37:44.081911 kubelet[2154]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:37:44.082245 kubelet[2154]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:37:44.082292 kubelet[2154]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:37:44.082423 kubelet[2154]: I0212 19:37:44.082390 2154 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:37:45.577832 kubelet[2154]: I0212 19:37:45.577800 2154 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:37:45.578859 kubelet[2154]: I0212 19:37:45.577977 2154 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:37:45.578859 kubelet[2154]: I0212 19:37:45.578186 2154 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:37:45.582540 kubelet[2154]: E0212 19:37:45.582515 2154 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.20.13:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:45.582630 kubelet[2154]: I0212 19:37:45.582553 2154 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:37:45.586802 kubelet[2154]: W0212 19:37:45.586781 2154 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:37:45.587283 kubelet[2154]: I0212 19:37:45.587264 2154 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:37:45.587482 kubelet[2154]: I0212 19:37:45.587469 2154 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:37:45.587634 kubelet[2154]: I0212 19:37:45.587615 2154 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:37:45.587634 kubelet[2154]: I0212 19:37:45.587634 2154 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:37:45.587777 kubelet[2154]: I0212 19:37:45.587643 2154 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:37:45.587777 kubelet[2154]: I0212 19:37:45.587767 2154 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:37:45.587882 kubelet[2154]: I0212 19:37:45.587864 2154 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:37:45.587924 kubelet[2154]: I0212 19:37:45.587888 2154 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:37:45.587924 kubelet[2154]: I0212 19:37:45.587906 2154 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:37:45.587924 kubelet[2154]: I0212 19:37:45.587919 2154 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:37:45.589815 kubelet[2154]: I0212 19:37:45.589788 2154 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:37:45.590575 kubelet[2154]: W0212 19:37:45.590534 2154 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Feb 12 19:37:45.592418 kubelet[2154]: W0212 19:37:45.592367 2154 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-04a5975e1d&limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:45.592599 kubelet[2154]: E0212 19:37:45.592543 2154 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-04a5975e1d&limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:45.592914 kubelet[2154]: W0212 19:37:45.592822 2154 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.13:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:45.593022 kubelet[2154]: E0212 19:37:45.593011 2154 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.13:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:45.594383 kubelet[2154]: I0212 19:37:45.594365 2154 server.go:1232] "Started kubelet" Feb 12 19:37:45.594000 audit[2154]: AVC avc: denied { mac_admin } for pid=2154 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:45.594000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:37:45.594000 audit[2154]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000cf9440 a1=4000e6c9f0 a2=4000cf9410 a3=25 items=0 ppid=1 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.596499 kubelet[2154]: E0212 19:37:45.596388 2154 event.go:289] Unable to write event: '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"ci-3510.3.2-a-04a5975e1d.17b334bbf6010f46", GenerateName:"", Namespace:"default", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Node", Namespace:"", Name:"ci-3510.3.2-a-04a5975e1d", UID:"ci-3510.3.2-a-04a5975e1d", APIVersion:"", ResourceVersion:"", FieldPath:""}, Reason:"Starting", Message:"Starting kubelet.", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-04a5975e1d"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 37, 45, 594343238, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 37, 45, 594343238, time.Local), Count:1, Type:"Normal", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-04a5975e1d"}': 'Post "https://10.200.20.13:6443/api/v1/namespaces/default/events": dial tcp 10.200.20.13:6443: connect: connection refused'(may retry after sleeping) Feb 12 19:37:45.596616 kubelet[2154]: I0212 19:37:45.596506 2154 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:37:45.594000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:37:45.596784 kubelet[2154]: I0212 19:37:45.596751 2154 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:37:45.596821 kubelet[2154]: I0212 19:37:45.596799 2154 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:37:45.596887 kubelet[2154]: I0212 19:37:45.596873 2154 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:37:45.596000 audit[2154]: AVC avc: denied { mac_admin } for pid=2154 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:45.596000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:37:45.596000 audit[2154]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000d46a80 a1=4000e6ca08 a2=4000cf94d0 a3=25 items=0 ppid=1 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.596000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:37:45.597169 kubelet[2154]: I0212 19:37:45.597157 2154 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:37:45.597305 kubelet[2154]: I0212 19:37:45.597292 2154 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:37:45.597387 kubelet[2154]: I0212 19:37:45.597357 2154 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:37:45.598467 kubelet[2154]: E0212 19:37:45.598441 2154 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:37:45.598467 kubelet[2154]: E0212 19:37:45.598467 2154 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:37:45.601370 kubelet[2154]: I0212 19:37:45.601304 2154 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:37:45.601483 kubelet[2154]: I0212 19:37:45.601408 2154 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:37:45.601483 kubelet[2154]: I0212 19:37:45.601469 2154 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:37:45.600000 audit[2164]: NETFILTER_CFG table=mangle:29 family=2 entries=2 op=nft_register_chain pid=2164 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:45.600000 audit[2164]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffdd12e260 a2=0 a3=1 items=0 ppid=2154 pid=2164 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.600000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:37:45.601946 kubelet[2154]: W0212 19:37:45.601883 2154 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:45.601986 kubelet[2154]: E0212 19:37:45.601947 2154 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:45.602853 kubelet[2154]: E0212 19:37:45.602811 2154 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-04a5975e1d?timeout=10s\": dial tcp 10.200.20.13:6443: connect: connection refused" interval="200ms" Feb 12 19:37:45.603000 audit[2165]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_register_chain pid=2165 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:45.603000 audit[2165]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6076e90 a2=0 a3=1 items=0 ppid=2154 pid=2165 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.603000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:37:45.606000 audit[2167]: NETFILTER_CFG table=filter:31 family=2 entries=2 op=nft_register_chain pid=2167 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:45.606000 audit[2167]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffedab4cb0 a2=0 a3=1 items=0 ppid=2154 pid=2167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.606000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:37:45.608000 audit[2169]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2169 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:45.608000 audit[2169]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=312 a0=3 a1=ffffdf2369b0 a2=0 a3=1 items=0 ppid=2154 pid=2169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.608000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:37:45.677653 kubelet[2154]: I0212 19:37:45.677613 2154 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:37:45.677653 kubelet[2154]: I0212 19:37:45.677636 2154 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:37:45.677653 kubelet[2154]: I0212 19:37:45.677653 2154 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:37:45.683086 kubelet[2154]: I0212 19:37:45.683060 2154 policy_none.go:49] "None policy: Start" Feb 12 19:37:45.683689 kubelet[2154]: I0212 19:37:45.683657 2154 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:37:45.683762 kubelet[2154]: I0212 19:37:45.683695 2154 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:37:45.692363 systemd[1]: Created slice kubepods.slice. Feb 12 19:37:45.696596 systemd[1]: Created slice kubepods-burstable.slice. Feb 12 19:37:45.699385 systemd[1]: Created slice kubepods-besteffort.slice. Feb 12 19:37:45.702868 kubelet[2154]: I0212 19:37:45.702838 2154 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.703297 kubelet[2154]: E0212 19:37:45.703281 2154 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.13:6443/api/v1/nodes\": dial tcp 10.200.20.13:6443: connect: connection refused" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.704648 kubelet[2154]: I0212 19:37:45.704626 2154 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:37:45.704000 audit[2154]: AVC avc: denied { mac_admin } for pid=2154 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:45.704000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:37:45.704000 audit[2154]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000a7d4d0 a1=4000d7e7b0 a2=4000a7d4a0 a3=25 items=0 ppid=1 pid=2154 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.704000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:37:45.705064 kubelet[2154]: I0212 19:37:45.705050 2154 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:37:45.705288 kubelet[2154]: I0212 19:37:45.705273 2154 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:37:45.706127 kubelet[2154]: E0212 19:37:45.706111 2154 eviction_manager.go:258] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.2-a-04a5975e1d\" not found" Feb 12 19:37:45.754000 audit[2176]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_rule pid=2176 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:45.754000 audit[2176]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=924 a0=3 a1=fffff2b1c650 a2=0 a3=1 items=0 ppid=2154 pid=2176 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.754000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Feb 12 19:37:45.756046 kubelet[2154]: I0212 19:37:45.756012 2154 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:37:45.756000 audit[2177]: NETFILTER_CFG table=mangle:34 family=10 entries=2 op=nft_register_chain pid=2177 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:37:45.756000 audit[2177]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe451eac0 a2=0 a3=1 items=0 ppid=2154 pid=2177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.756000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Feb 12 19:37:45.757296 kubelet[2154]: I0212 19:37:45.757281 2154 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:37:45.757374 kubelet[2154]: I0212 19:37:45.757365 2154 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:37:45.757548 kubelet[2154]: I0212 19:37:45.757536 2154 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:37:45.757737 kubelet[2154]: E0212 19:37:45.757723 2154 kubelet.go:2327] "Skipping pod synchronization" err="PLEG is not healthy: pleg has yet to be successful" Feb 12 19:37:45.758282 kubelet[2154]: W0212 19:37:45.758246 2154 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:45.758282 kubelet[2154]: E0212 19:37:45.758284 2154 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:45.758000 audit[2178]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2178 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:45.758000 audit[2178]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0801eb0 a2=0 a3=1 items=0 ppid=2154 pid=2178 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.758000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:37:45.758000 audit[2179]: NETFILTER_CFG table=mangle:36 family=10 entries=1 op=nft_register_chain pid=2179 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:37:45.758000 audit[2179]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd69759b0 a2=0 a3=1 items=0 ppid=2154 pid=2179 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.758000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Feb 12 19:37:45.759000 audit[2181]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:45.759000 audit[2181]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffca95bef0 a2=0 a3=1 items=0 ppid=2154 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.759000 audit[2182]: NETFILTER_CFG table=nat:38 family=10 entries=2 op=nft_register_chain pid=2182 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:37:45.759000 audit[2182]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=128 a0=3 a1=ffffca34f5f0 a2=0 a3=1 items=0 ppid=2154 pid=2182 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.759000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:37:45.759000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Feb 12 19:37:45.761000 audit[2183]: NETFILTER_CFG table=filter:39 family=10 entries=2 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:37:45.761000 audit[2183]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=136 a0=3 a1=ffffe614a630 a2=0 a3=1 items=0 ppid=2154 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.761000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:37:45.761000 audit[2184]: NETFILTER_CFG table=filter:40 family=2 entries=1 op=nft_register_chain pid=2184 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:37:45.761000 audit[2184]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe3ba2000 a2=0 a3=1 items=0 ppid=2154 pid=2184 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:45.761000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Feb 12 19:37:45.803210 kubelet[2154]: E0212 19:37:45.803179 2154 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-04a5975e1d?timeout=10s\": dial tcp 10.200.20.13:6443: connect: connection refused" interval="400ms" Feb 12 19:37:45.858385 kubelet[2154]: I0212 19:37:45.858291 2154 topology_manager.go:215] "Topology Admit Handler" podUID="b749aca798785553045fd0f56302a003" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.861049 kubelet[2154]: I0212 19:37:45.861026 2154 topology_manager.go:215] "Topology Admit Handler" podUID="41054977f0f7210187b7561c319502f4" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.862591 kubelet[2154]: I0212 19:37:45.862569 2154 topology_manager.go:215] "Topology Admit Handler" podUID="d7792b8210c0be2da12e598957c573ac" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.868073 systemd[1]: Created slice kubepods-burstable-podb749aca798785553045fd0f56302a003.slice. Feb 12 19:37:45.889421 systemd[1]: Created slice kubepods-burstable-pod41054977f0f7210187b7561c319502f4.slice. Feb 12 19:37:45.899747 systemd[1]: Created slice kubepods-burstable-podd7792b8210c0be2da12e598957c573ac.slice. Feb 12 19:37:45.902954 kubelet[2154]: I0212 19:37:45.902932 2154 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b749aca798785553045fd0f56302a003-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-04a5975e1d\" (UID: \"b749aca798785553045fd0f56302a003\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.903097 kubelet[2154]: I0212 19:37:45.903085 2154 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.903201 kubelet[2154]: I0212 19:37:45.903189 2154 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.903285 kubelet[2154]: I0212 19:37:45.903276 2154 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d7792b8210c0be2da12e598957c573ac-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-04a5975e1d\" (UID: \"d7792b8210c0be2da12e598957c573ac\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.903365 kubelet[2154]: I0212 19:37:45.903356 2154 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b749aca798785553045fd0f56302a003-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-04a5975e1d\" (UID: \"b749aca798785553045fd0f56302a003\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.903452 kubelet[2154]: I0212 19:37:45.903442 2154 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b749aca798785553045fd0f56302a003-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-04a5975e1d\" (UID: \"b749aca798785553045fd0f56302a003\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.903544 kubelet[2154]: I0212 19:37:45.903534 2154 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.903633 kubelet[2154]: I0212 19:37:45.903623 2154 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.903791 kubelet[2154]: I0212 19:37:45.903753 2154 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.905219 kubelet[2154]: I0212 19:37:45.905186 2154 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:45.905558 kubelet[2154]: E0212 19:37:45.905532 2154 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.13:6443/api/v1/nodes\": dial tcp 10.200.20.13:6443: connect: connection refused" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:46.188700 env[1376]: time="2024-02-12T19:37:46.188592557Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-04a5975e1d,Uid:b749aca798785553045fd0f56302a003,Namespace:kube-system,Attempt:0,}" Feb 12 19:37:46.199012 env[1376]: time="2024-02-12T19:37:46.198973040Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-04a5975e1d,Uid:41054977f0f7210187b7561c319502f4,Namespace:kube-system,Attempt:0,}" Feb 12 19:37:46.201997 env[1376]: time="2024-02-12T19:37:46.201956370Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-04a5975e1d,Uid:d7792b8210c0be2da12e598957c573ac,Namespace:kube-system,Attempt:0,}" Feb 12 19:37:46.204116 kubelet[2154]: E0212 19:37:46.204092 2154 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-04a5975e1d?timeout=10s\": dial tcp 10.200.20.13:6443: connect: connection refused" interval="800ms" Feb 12 19:37:46.307527 kubelet[2154]: I0212 19:37:46.307185 2154 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:46.307527 kubelet[2154]: E0212 19:37:46.307501 2154 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.13:6443/api/v1/nodes\": dial tcp 10.200.20.13:6443: connect: connection refused" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:46.459601 kubelet[2154]: W0212 19:37:46.459314 2154 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.CSIDriver: Get "https://10.200.20.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:46.459601 kubelet[2154]: E0212 19:37:46.459356 2154 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.20.13:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:46.882493 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount788208368.mount: Deactivated successfully. Feb 12 19:37:46.903132 env[1376]: time="2024-02-12T19:37:46.903082448Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.911502 kubelet[2154]: W0212 19:37:46.911464 2154 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Node: Get "https://10.200.20.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-04a5975e1d&limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:46.911502 kubelet[2154]: E0212 19:37:46.911509 2154 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.20.13:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.2-a-04a5975e1d&limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:46.918061 env[1376]: time="2024-02-12T19:37:46.918010657Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.921561 env[1376]: time="2024-02-12T19:37:46.921527438Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.924297 env[1376]: time="2024-02-12T19:37:46.924268519Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.932151 env[1376]: time="2024-02-12T19:37:46.932119813Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.940439 env[1376]: time="2024-02-12T19:37:46.940401091Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.944216 env[1376]: time="2024-02-12T19:37:46.944173318Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:7d46a07936af93fcce097459055f93ab07331509aa55f4a2a90d95a3ace1850e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.947647 env[1376]: time="2024-02-12T19:37:46.947603229Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.952837 env[1376]: time="2024-02-12T19:37:46.952791631Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.958146 env[1376]: time="2024-02-12T19:37:46.958103377Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.961927 env[1376]: time="2024-02-12T19:37:46.961886362Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:46.973973 env[1376]: time="2024-02-12T19:37:46.973934828Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:37:47.005101 kubelet[2154]: E0212 19:37:47.005068 2154 controller.go:146] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-04a5975e1d?timeout=10s\": dial tcp 10.200.20.13:6443: connect: connection refused" interval="1.6s" Feb 12 19:37:47.018963 kubelet[2154]: W0212 19:37:47.018885 2154 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.RuntimeClass: Get "https://10.200.20.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:47.018963 kubelet[2154]: E0212 19:37:47.018926 2154 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.20.13:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:47.034462 env[1376]: time="2024-02-12T19:37:47.023953406Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:37:47.034462 env[1376]: time="2024-02-12T19:37:47.023991681Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:37:47.034462 env[1376]: time="2024-02-12T19:37:47.024001280Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:37:47.034462 env[1376]: time="2024-02-12T19:37:47.024161539Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e38d323f946888caa69613ca3aeba1952181e01a3b13f1fa6c0b5945c5916f96 pid=2194 runtime=io.containerd.runc.v2 Feb 12 19:37:47.039140 kubelet[2154]: W0212 19:37:47.039071 2154 reflector.go:535] vendor/k8s.io/client-go/informers/factory.go:150: failed to list *v1.Service: Get "https://10.200.20.13:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:47.039140 kubelet[2154]: E0212 19:37:47.039109 2154 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:150: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.20.13:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.20.13:6443: connect: connection refused Feb 12 19:37:47.048643 systemd[1]: Started cri-containerd-e38d323f946888caa69613ca3aeba1952181e01a3b13f1fa6c0b5945c5916f96.scope. Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.073000 audit: BPF prog-id=68 op=LOAD Feb 12 19:37:47.074566 env[1376]: time="2024-02-12T19:37:47.073319115Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:37:47.074566 env[1376]: time="2024-02-12T19:37:47.073363429Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:37:47.074566 env[1376]: time="2024-02-12T19:37:47.073374747Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:37:47.074566 env[1376]: time="2024-02-12T19:37:47.073530488Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d1b748c5e06931ed16e4c41367818f78ee5598afad6f09437080e839366a43b7 pid=2222 runtime=io.containerd.runc.v2 Feb 12 19:37:47.074566 env[1376]: time="2024-02-12T19:37:47.074096416Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:37:47.074566 env[1376]: time="2024-02-12T19:37:47.074173406Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:37:47.074566 env[1376]: time="2024-02-12T19:37:47.074201002Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:37:47.074566 env[1376]: time="2024-02-12T19:37:47.074361142Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1af38a8b2786d7ce79096d5e8f2d743c295c51b884dc18fe7084a125ed643d46 pid=2240 runtime=io.containerd.runc.v2 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533386433323366393436383838636161363936313363613361656261 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533386433323366393436383838636161363936313363613361656261 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit: BPF prog-id=69 op=LOAD Feb 12 19:37:47.075000 audit[2204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533386433323366393436383838636161363936313363613361656261 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit: BPF prog-id=70 op=LOAD Feb 12 19:37:47.075000 audit[2204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533386433323366393436383838636161363936313363613361656261 Feb 12 19:37:47.075000 audit: BPF prog-id=70 op=UNLOAD Feb 12 19:37:47.075000 audit: BPF prog-id=69 op=UNLOAD Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { perfmon } for pid=2204 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit[2204]: AVC avc: denied { bpf } for pid=2204 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.075000 audit: BPF prog-id=71 op=LOAD Feb 12 19:37:47.075000 audit[2204]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2194 pid=2204 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.075000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533386433323366393436383838636161363936313363613361656261 Feb 12 19:37:47.092558 systemd[1]: Started cri-containerd-d1b748c5e06931ed16e4c41367818f78ee5598afad6f09437080e839366a43b7.scope. Feb 12 19:37:47.107435 env[1376]: time="2024-02-12T19:37:47.107329900Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.2-a-04a5975e1d,Uid:b749aca798785553045fd0f56302a003,Namespace:kube-system,Attempt:0,} returns sandbox id \"e38d323f946888caa69613ca3aeba1952181e01a3b13f1fa6c0b5945c5916f96\"" Feb 12 19:37:47.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.108000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.108000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.109000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.109000 audit: BPF prog-id=72 op=LOAD Feb 12 19:37:47.110855 kubelet[2154]: I0212 19:37:47.110485 2154 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:47.110855 kubelet[2154]: E0212 19:37:47.110837 2154 kubelet_node_status.go:92] "Unable to register node with API server" err="Post \"https://10.200.20.13:6443/api/v1/nodes\": dial tcp 10.200.20.13:6443: connect: connection refused" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2222 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623734386335653036393331656431366534633431333637383138 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2222 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623734386335653036393331656431366534633431333637383138 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.110000 audit: BPF prog-id=73 op=LOAD Feb 12 19:37:47.110000 audit[2253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2222 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.110000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623734386335653036393331656431366534633431333637383138 Feb 12 19:37:47.111000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.111000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.111000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.111000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.111000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.111000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.111000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.111000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.111000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.111000 audit: BPF prog-id=74 op=LOAD Feb 12 19:37:47.111000 audit[2253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2222 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.111000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623734386335653036393331656431366534633431333637383138 Feb 12 19:37:47.112000 audit: BPF prog-id=74 op=UNLOAD Feb 12 19:37:47.112000 audit: BPF prog-id=73 op=UNLOAD Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.113127 env[1376]: time="2024-02-12T19:37:47.113035373Z" level=info msg="CreateContainer within sandbox \"e38d323f946888caa69613ca3aeba1952181e01a3b13f1fa6c0b5945c5916f96\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { perfmon } for pid=2253 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.112000 audit[2253]: AVC avc: denied { bpf } for pid=2253 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.112000 audit: BPF prog-id=75 op=LOAD Feb 12 19:37:47.112000 audit[2253]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2222 pid=2253 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.112000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6431623734386335653036393331656431366534633431333637383138 Feb 12 19:37:47.119594 systemd[1]: Started cri-containerd-1af38a8b2786d7ce79096d5e8f2d743c295c51b884dc18fe7084a125ed643d46.scope. Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.139000 audit: BPF prog-id=76 op=LOAD Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2240 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161663338613862323738366437636537393039366435653866326437 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2240 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161663338613862323738366437636537393039366435653866326437 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit: BPF prog-id=77 op=LOAD Feb 12 19:37:47.140000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2240 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161663338613862323738366437636537393039366435653866326437 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit: BPF prog-id=78 op=LOAD Feb 12 19:37:47.140000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2240 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161663338613862323738366437636537393039366435653866326437 Feb 12 19:37:47.140000 audit: BPF prog-id=78 op=UNLOAD Feb 12 19:37:47.140000 audit: BPF prog-id=77 op=UNLOAD Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { perfmon } for pid=2261 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit[2261]: AVC avc: denied { bpf } for pid=2261 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.140000 audit: BPF prog-id=79 op=LOAD Feb 12 19:37:47.140000 audit[2261]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2240 pid=2261 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.140000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3161663338613862323738366437636537393039366435653866326437 Feb 12 19:37:47.146134 env[1376]: time="2024-02-12T19:37:47.146090760Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.2-a-04a5975e1d,Uid:41054977f0f7210187b7561c319502f4,Namespace:kube-system,Attempt:0,} returns sandbox id \"d1b748c5e06931ed16e4c41367818f78ee5598afad6f09437080e839366a43b7\"" Feb 12 19:37:47.151621 env[1376]: time="2024-02-12T19:37:47.151583540Z" level=info msg="CreateContainer within sandbox \"d1b748c5e06931ed16e4c41367818f78ee5598afad6f09437080e839366a43b7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Feb 12 19:37:47.163624 env[1376]: time="2024-02-12T19:37:47.163581531Z" level=info msg="CreateContainer within sandbox \"e38d323f946888caa69613ca3aeba1952181e01a3b13f1fa6c0b5945c5916f96\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"9aa2a0895947efc438e7d6173c782aa7c305fd59f8a262877fae65bff400974a\"" Feb 12 19:37:47.165432 env[1376]: time="2024-02-12T19:37:47.165398180Z" level=info msg="StartContainer for \"9aa2a0895947efc438e7d6173c782aa7c305fd59f8a262877fae65bff400974a\"" Feb 12 19:37:47.166271 env[1376]: time="2024-02-12T19:37:47.166243072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.2-a-04a5975e1d,Uid:d7792b8210c0be2da12e598957c573ac,Namespace:kube-system,Attempt:0,} returns sandbox id \"1af38a8b2786d7ce79096d5e8f2d743c295c51b884dc18fe7084a125ed643d46\"" Feb 12 19:37:47.169048 env[1376]: time="2024-02-12T19:37:47.168660364Z" level=info msg="CreateContainer within sandbox \"1af38a8b2786d7ce79096d5e8f2d743c295c51b884dc18fe7084a125ed643d46\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Feb 12 19:37:47.182929 systemd[1]: Started cri-containerd-9aa2a0895947efc438e7d6173c782aa7c305fd59f8a262877fae65bff400974a.scope. Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.197000 audit: BPF prog-id=80 op=LOAD Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000149b38 a2=10 a3=0 items=0 ppid=2194 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613261303839353934376566633433386537643631373363373832 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001495a0 a2=3c a3=0 items=0 ppid=2194 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613261303839353934376566633433386537643631373363373832 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.200000 audit: BPF prog-id=81 op=LOAD Feb 12 19:37:47.200000 audit[2320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001498e0 a2=78 a3=0 items=0 ppid=2194 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.200000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613261303839353934376566633433386537643631373363373832 Feb 12 19:37:47.201000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.201000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.201000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.201000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.201000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.201000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.201000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.201000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.201000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.201000 audit: BPF prog-id=82 op=LOAD Feb 12 19:37:47.201000 audit[2320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000149670 a2=78 a3=0 items=0 ppid=2194 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.201000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613261303839353934376566633433386537643631373363373832 Feb 12 19:37:47.202000 audit: BPF prog-id=82 op=UNLOAD Feb 12 19:37:47.202000 audit: BPF prog-id=81 op=UNLOAD Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { perfmon } for pid=2320 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit[2320]: AVC avc: denied { bpf } for pid=2320 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.202000 audit: BPF prog-id=83 op=LOAD Feb 12 19:37:47.202000 audit[2320]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000149b40 a2=78 a3=0 items=0 ppid=2194 pid=2320 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3961613261303839353934376566633433386537643631373363373832 Feb 12 19:37:47.211719 env[1376]: time="2024-02-12T19:37:47.211677002Z" level=info msg="CreateContainer within sandbox \"d1b748c5e06931ed16e4c41367818f78ee5598afad6f09437080e839366a43b7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47\"" Feb 12 19:37:47.212576 env[1376]: time="2024-02-12T19:37:47.212537532Z" level=info msg="StartContainer for \"09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47\"" Feb 12 19:37:47.223585 env[1376]: time="2024-02-12T19:37:47.223539730Z" level=info msg="CreateContainer within sandbox \"1af38a8b2786d7ce79096d5e8f2d743c295c51b884dc18fe7084a125ed643d46\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23\"" Feb 12 19:37:47.224221 env[1376]: time="2024-02-12T19:37:47.224195527Z" level=info msg="StartContainer for \"16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23\"" Feb 12 19:37:47.235180 env[1376]: time="2024-02-12T19:37:47.235133973Z" level=info msg="StartContainer for \"9aa2a0895947efc438e7d6173c782aa7c305fd59f8a262877fae65bff400974a\" returns successfully" Feb 12 19:37:47.242611 systemd[1]: Started cri-containerd-09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47.scope. Feb 12 19:37:47.256989 systemd[1]: Started cri-containerd-16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23.scope. Feb 12 19:37:47.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit: BPF prog-id=84 op=LOAD Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2222 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613033303837343162323662633139333931373533626563303265 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2222 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613033303837343162323662633139333931373533626563303265 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit: BPF prog-id=85 op=LOAD Feb 12 19:37:47.270000 audit[2351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2222 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613033303837343162323662633139333931373533626563303265 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit: BPF prog-id=86 op=LOAD Feb 12 19:37:47.270000 audit[2351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2222 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613033303837343162323662633139333931373533626563303265 Feb 12 19:37:47.270000 audit: BPF prog-id=86 op=UNLOAD Feb 12 19:37:47.270000 audit: BPF prog-id=85 op=UNLOAD Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { perfmon } for pid=2351 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit[2351]: AVC avc: denied { bpf } for pid=2351 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.270000 audit: BPF prog-id=87 op=LOAD Feb 12 19:37:47.270000 audit[2351]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2222 pid=2351 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.270000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039613033303837343162323662633139333931373533626563303265 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.277000 audit: BPF prog-id=88 op=LOAD Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2240 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353138626132346166393937333336373936353436663266303932 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2240 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353138626132346166393937333336373936353436663266303932 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit: BPF prog-id=89 op=LOAD Feb 12 19:37:47.278000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2240 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353138626132346166393937333336373936353436663266303932 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.278000 audit: BPF prog-id=90 op=LOAD Feb 12 19:37:47.278000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2240 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.278000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353138626132346166393937333336373936353436663266303932 Feb 12 19:37:47.280000 audit: BPF prog-id=90 op=UNLOAD Feb 12 19:37:47.280000 audit: BPF prog-id=89 op=UNLOAD Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { perfmon } for pid=2367 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit[2367]: AVC avc: denied { bpf } for pid=2367 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:47.280000 audit: BPF prog-id=91 op=LOAD Feb 12 19:37:47.280000 audit[2367]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2240 pid=2367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:47.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3136353138626132346166393937333336373936353436663266303932 Feb 12 19:37:47.315975 env[1376]: time="2024-02-12T19:37:47.315923317Z" level=info msg="StartContainer for \"09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47\" returns successfully" Feb 12 19:37:47.321127 env[1376]: time="2024-02-12T19:37:47.321074460Z" level=info msg="StartContainer for \"16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23\" returns successfully" Feb 12 19:37:48.712532 kubelet[2154]: I0212 19:37:48.712502 2154 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:49.175000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.181488 kernel: kauditd_printk_skb: 557 callbacks suppressed Feb 12 19:37:49.181625 kernel: audit: type=1400 audit(1707766669.175:698): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.175000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40065c2c00 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:37:49.243231 kernel: audit: type=1300 audit(1707766669.175:698): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=40065c2c00 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:37:49.175000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:37:49.277312 kernel: audit: type=1327 audit(1707766669.175:698): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:37:49.204000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.306463 kernel: audit: type=1400 audit(1707766669.204:699): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.204000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400612fb60 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:37:49.345695 kernel: audit: type=1300 audit(1707766669.204:699): arch=c00000b7 syscall=27 success=no exit=-13 a0=41 a1=400612fb60 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:37:49.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:37:49.370085 kernel: audit: type=1327 audit(1707766669.204:699): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:37:49.204000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.393582 kernel: audit: type=1400 audit(1707766669.204:700): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.393719 kernel: audit: type=1300 audit(1707766669.204:700): arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40065c2d80 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:37:49.204000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40065c2d80 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:37:49.204000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:37:49.445584 kernel: audit: type=1327 audit(1707766669.204:700): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:37:49.207000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.469099 kernel: audit: type=1400 audit(1707766669.207:701): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.207000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=40 a1=40065c3e60 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:37:49.207000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:37:49.277000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.277000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=49 a1=4003862030 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:37:49.277000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:37:49.278000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:49.278000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=4d a1=400408e6a0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:37:49.278000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:37:49.535104 kubelet[2154]: E0212 19:37:49.535077 2154 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.2-a-04a5975e1d\" not found" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:49.590420 kubelet[2154]: I0212 19:37:49.590385 2154 apiserver.go:52] "Watching apiserver" Feb 12 19:37:49.601497 kubelet[2154]: I0212 19:37:49.601468 2154 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:49.601832 kubelet[2154]: I0212 19:37:49.601814 2154 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:37:50.366000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:50.366000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40006d2000 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:37:50.366000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:37:50.367000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:50.367000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=400040ea60 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:37:50.367000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:37:52.129827 systemd[1]: Reloading. Feb 12 19:37:52.139881 kubelet[2154]: W0212 19:37:52.139862 2154 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:37:52.229162 /usr/lib/systemd/system-generators/torcx-generator[2441]: time="2024-02-12T19:37:52Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.2 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.2 /var/lib/torcx/store]" Feb 12 19:37:52.229194 /usr/lib/systemd/system-generators/torcx-generator[2441]: time="2024-02-12T19:37:52Z" level=info msg="torcx already run" Feb 12 19:37:52.322174 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Feb 12 19:37:52.322462 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Feb 12 19:37:52.338231 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Feb 12 19:37:52.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.419000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit: BPF prog-id=92 op=LOAD Feb 12 19:37:52.420000 audit: BPF prog-id=53 op=UNLOAD Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.420000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit: BPF prog-id=93 op=LOAD Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.421000 audit: BPF prog-id=94 op=LOAD Feb 12 19:37:52.421000 audit: BPF prog-id=54 op=UNLOAD Feb 12 19:37:52.421000 audit: BPF prog-id=55 op=UNLOAD Feb 12 19:37:52.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.422000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.422000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.423000 audit: BPF prog-id=95 op=LOAD Feb 12 19:37:52.423000 audit: BPF prog-id=72 op=UNLOAD Feb 12 19:37:52.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.423000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.423000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit: BPF prog-id=96 op=LOAD Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.424000 audit: BPF prog-id=97 op=LOAD Feb 12 19:37:52.424000 audit: BPF prog-id=56 op=UNLOAD Feb 12 19:37:52.424000 audit: BPF prog-id=57 op=UNLOAD Feb 12 19:37:52.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.425000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.425000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.426000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.426000 audit: BPF prog-id=98 op=LOAD Feb 12 19:37:52.426000 audit: BPF prog-id=84 op=UNLOAD Feb 12 19:37:52.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.427000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.427000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit: BPF prog-id=99 op=LOAD Feb 12 19:37:52.428000 audit: BPF prog-id=58 op=UNLOAD Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit: BPF prog-id=100 op=LOAD Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.428000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.429000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.429000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.429000 audit: BPF prog-id=101 op=LOAD Feb 12 19:37:52.429000 audit: BPF prog-id=59 op=UNLOAD Feb 12 19:37:52.429000 audit: BPF prog-id=60 op=UNLOAD Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.431000 audit: BPF prog-id=102 op=LOAD Feb 12 19:37:52.431000 audit: BPF prog-id=88 op=UNLOAD Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.432000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.433000 audit: BPF prog-id=103 op=LOAD Feb 12 19:37:52.433000 audit: BPF prog-id=61 op=UNLOAD Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.434000 audit: BPF prog-id=104 op=LOAD Feb 12 19:37:52.434000 audit: BPF prog-id=62 op=UNLOAD Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.435000 audit: BPF prog-id=105 op=LOAD Feb 12 19:37:52.435000 audit: BPF prog-id=63 op=UNLOAD Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.436000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit: BPF prog-id=106 op=LOAD Feb 12 19:37:52.437000 audit: BPF prog-id=68 op=UNLOAD Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.437000 audit: BPF prog-id=107 op=LOAD Feb 12 19:37:52.438000 audit: BPF prog-id=76 op=UNLOAD Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.438000 audit: BPF prog-id=108 op=LOAD Feb 12 19:37:52.438000 audit: BPF prog-id=80 op=UNLOAD Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.440000 audit: BPF prog-id=109 op=LOAD Feb 12 19:37:52.441000 audit: BPF prog-id=64 op=UNLOAD Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit: BPF prog-id=110 op=LOAD Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.441000 audit: BPF prog-id=111 op=LOAD Feb 12 19:37:52.442000 audit: BPF prog-id=65 op=UNLOAD Feb 12 19:37:52.442000 audit: BPF prog-id=66 op=UNLOAD Feb 12 19:37:52.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.442000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.442000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.443000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.443000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.443000 audit: BPF prog-id=112 op=LOAD Feb 12 19:37:52.443000 audit: BPF prog-id=67 op=UNLOAD Feb 12 19:37:52.464169 systemd[1]: Stopping kubelet.service... Feb 12 19:37:52.487024 systemd[1]: kubelet.service: Deactivated successfully. Feb 12 19:37:52.487341 systemd[1]: Stopped kubelet.service. Feb 12 19:37:52.485000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:52.487603 systemd[1]: kubelet.service: Consumed 1.826s CPU time. Feb 12 19:37:52.490098 systemd[1]: Started kubelet.service. Feb 12 19:37:52.488000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:52.559091 kubelet[2501]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:37:52.559414 kubelet[2501]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Feb 12 19:37:52.559472 kubelet[2501]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Feb 12 19:37:52.559627 kubelet[2501]: I0212 19:37:52.559593 2501 server.go:203] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Feb 12 19:37:52.564866 kubelet[2501]: I0212 19:37:52.564839 2501 server.go:467] "Kubelet version" kubeletVersion="v1.28.1" Feb 12 19:37:52.564997 kubelet[2501]: I0212 19:37:52.564987 2501 server.go:469] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Feb 12 19:37:52.565240 kubelet[2501]: I0212 19:37:52.565225 2501 server.go:895] "Client rotation is on, will bootstrap in background" Feb 12 19:37:52.566907 kubelet[2501]: I0212 19:37:52.566889 2501 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Feb 12 19:37:52.568028 kubelet[2501]: I0212 19:37:52.567993 2501 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Feb 12 19:37:52.573211 kubelet[2501]: W0212 19:37:52.573186 2501 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:37:52.573893 kubelet[2501]: I0212 19:37:52.573872 2501 server.go:725] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Feb 12 19:37:52.574098 kubelet[2501]: I0212 19:37:52.574083 2501 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Feb 12 19:37:52.574270 kubelet[2501]: I0212 19:37:52.574249 2501 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Feb 12 19:37:52.574357 kubelet[2501]: I0212 19:37:52.574276 2501 topology_manager.go:138] "Creating topology manager with none policy" Feb 12 19:37:52.574357 kubelet[2501]: I0212 19:37:52.574286 2501 container_manager_linux.go:301] "Creating device plugin manager" Feb 12 19:37:52.574357 kubelet[2501]: I0212 19:37:52.574317 2501 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:37:52.574428 kubelet[2501]: I0212 19:37:52.574402 2501 kubelet.go:393] "Attempting to sync node with API server" Feb 12 19:37:52.574428 kubelet[2501]: I0212 19:37:52.574416 2501 kubelet.go:298] "Adding static pod path" path="/etc/kubernetes/manifests" Feb 12 19:37:52.574478 kubelet[2501]: I0212 19:37:52.574432 2501 kubelet.go:309] "Adding apiserver pod source" Feb 12 19:37:52.578722 kubelet[2501]: I0212 19:37:52.578702 2501 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Feb 12 19:37:52.580039 kubelet[2501]: I0212 19:37:52.580023 2501 kuberuntime_manager.go:257] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Feb 12 19:37:52.580571 kubelet[2501]: I0212 19:37:52.580556 2501 server.go:1232] "Started kubelet" Feb 12 19:37:52.580000 audit[2501]: AVC avc: denied { mac_admin } for pid=2501 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.580000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:37:52.580000 audit[2501]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b17e00 a1=4000a3fe18 a2=4000b17dd0 a3=25 items=0 ppid=1 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:52.580000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:37:52.582649 kubelet[2501]: I0212 19:37:52.582635 2501 kubelet.go:1386] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Feb 12 19:37:52.581000 audit[2501]: AVC avc: denied { mac_admin } for pid=2501 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.581000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:37:52.581000 audit[2501]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4000b5ca20 a1=4000a3fe30 a2=4000b17e90 a3=25 items=0 ppid=1 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:52.581000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:37:52.582988 kubelet[2501]: I0212 19:37:52.582975 2501 kubelet.go:1390] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Feb 12 19:37:52.583059 kubelet[2501]: I0212 19:37:52.583050 2501 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Feb 12 19:37:52.593402 kubelet[2501]: I0212 19:37:52.593375 2501 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Feb 12 19:37:52.594269 kubelet[2501]: I0212 19:37:52.594254 2501 server.go:462] "Adding debug handlers to kubelet server" Feb 12 19:37:52.595463 kubelet[2501]: I0212 19:37:52.595447 2501 ratelimit.go:65] "Setting rate limiting for podresources endpoint" qps=100 burstTokens=10 Feb 12 19:37:52.595759 kubelet[2501]: I0212 19:37:52.595744 2501 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Feb 12 19:37:52.601747 kubelet[2501]: E0212 19:37:52.601211 2501 cri_stats_provider.go:448] "Failed to get the info of the filesystem with mountpoint" err="unable to find data in memory cache" mountpoint="/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs" Feb 12 19:37:52.601747 kubelet[2501]: E0212 19:37:52.601246 2501 kubelet.go:1431] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Feb 12 19:37:52.602513 kubelet[2501]: I0212 19:37:52.602497 2501 volume_manager.go:291] "Starting Kubelet Volume Manager" Feb 12 19:37:52.618964 kubelet[2501]: I0212 19:37:52.618933 2501 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Feb 12 19:37:52.619243 kubelet[2501]: I0212 19:37:52.619232 2501 reconciler_new.go:29] "Reconciler: start to sync state" Feb 12 19:37:52.622503 kubelet[2501]: I0212 19:37:52.622480 2501 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Feb 12 19:37:52.624719 kubelet[2501]: I0212 19:37:52.624700 2501 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Feb 12 19:37:52.624871 kubelet[2501]: I0212 19:37:52.624860 2501 status_manager.go:217] "Starting to sync pod status with apiserver" Feb 12 19:37:52.624944 kubelet[2501]: I0212 19:37:52.624935 2501 kubelet.go:2303] "Starting kubelet main sync loop" Feb 12 19:37:52.625048 kubelet[2501]: E0212 19:37:52.625036 2501 kubelet.go:2327] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Feb 12 19:37:52.713026 kubelet[2501]: I0212 19:37:52.713000 2501 kubelet_node_status.go:70] "Attempting to register node" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:52.725558 kubelet[2501]: E0212 19:37:52.725520 2501 kubelet.go:2327] "Skipping pod synchronization" err="container runtime status check may not have completed yet" Feb 12 19:37:52.750926 kubelet[2501]: I0212 19:37:52.750884 2501 kubelet_node_status.go:108] "Node was previously registered" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:52.751061 kubelet[2501]: I0212 19:37:52.750975 2501 kubelet_node_status.go:73] "Successfully registered node" node="ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:52.760613 kubelet[2501]: I0212 19:37:52.760580 2501 cpu_manager.go:214] "Starting CPU manager" policy="none" Feb 12 19:37:52.760778 kubelet[2501]: I0212 19:37:52.760766 2501 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Feb 12 19:37:52.760878 kubelet[2501]: I0212 19:37:52.760868 2501 state_mem.go:36] "Initialized new in-memory state store" Feb 12 19:37:52.761109 kubelet[2501]: I0212 19:37:52.761099 2501 state_mem.go:88] "Updated default CPUSet" cpuSet="" Feb 12 19:37:52.761204 kubelet[2501]: I0212 19:37:52.761194 2501 state_mem.go:96] "Updated CPUSet assignments" assignments={} Feb 12 19:37:52.761270 kubelet[2501]: I0212 19:37:52.761261 2501 policy_none.go:49] "None policy: Start" Feb 12 19:37:52.763936 kubelet[2501]: I0212 19:37:52.763917 2501 memory_manager.go:169] "Starting memorymanager" policy="None" Feb 12 19:37:52.764081 kubelet[2501]: I0212 19:37:52.764071 2501 state_mem.go:35] "Initializing new in-memory state store" Feb 12 19:37:52.764317 kubelet[2501]: I0212 19:37:52.764306 2501 state_mem.go:75] "Updated machine memory state" Feb 12 19:37:52.772621 kubelet[2501]: I0212 19:37:52.772602 2501 manager.go:471] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Feb 12 19:37:52.771000 audit[2501]: AVC avc: denied { mac_admin } for pid=2501 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:37:52.771000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Feb 12 19:37:52.771000 audit[2501]: SYSCALL arch=c00000b7 syscall=5 success=no exit=-22 a0=4001219950 a1=40012674b8 a2=4001219920 a3=25 items=0 ppid=1 pid=2501 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/opt/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:37:52.771000 audit: PROCTITLE proctitle=2F6F70742F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Feb 12 19:37:52.774035 kubelet[2501]: I0212 19:37:52.774006 2501 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Feb 12 19:37:52.774726 kubelet[2501]: I0212 19:37:52.774711 2501 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Feb 12 19:37:52.926151 kubelet[2501]: I0212 19:37:52.926116 2501 topology_manager.go:215] "Topology Admit Handler" podUID="b749aca798785553045fd0f56302a003" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:52.926426 kubelet[2501]: I0212 19:37:52.926411 2501 topology_manager.go:215] "Topology Admit Handler" podUID="41054977f0f7210187b7561c319502f4" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:52.926527 kubelet[2501]: I0212 19:37:52.926515 2501 topology_manager.go:215] "Topology Admit Handler" podUID="d7792b8210c0be2da12e598957c573ac" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:52.941970 kubelet[2501]: W0212 19:37:52.941946 2501 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:37:52.942194 kubelet[2501]: E0212 19:37:52.942173 2501 kubelet.go:1890] "Failed creating a mirror pod for" err="pods \"kube-scheduler-ci-3510.3.2-a-04a5975e1d\" already exists" pod="kube-system/kube-scheduler-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:52.942360 kubelet[2501]: W0212 19:37:52.942349 2501 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:37:52.942566 kubelet[2501]: W0212 19:37:52.942553 2501 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Feb 12 19:37:53.021299 kubelet[2501]: I0212 19:37:53.021190 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/d7792b8210c0be2da12e598957c573ac-kubeconfig\") pod \"kube-scheduler-ci-3510.3.2-a-04a5975e1d\" (UID: \"d7792b8210c0be2da12e598957c573ac\") " pod="kube-system/kube-scheduler-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:53.021299 kubelet[2501]: I0212 19:37:53.021234 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/b749aca798785553045fd0f56302a003-ca-certs\") pod \"kube-apiserver-ci-3510.3.2-a-04a5975e1d\" (UID: \"b749aca798785553045fd0f56302a003\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:53.021299 kubelet[2501]: I0212 19:37:53.021261 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:53.021299 kubelet[2501]: I0212 19:37:53.021280 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/b749aca798785553045fd0f56302a003-k8s-certs\") pod \"kube-apiserver-ci-3510.3.2-a-04a5975e1d\" (UID: \"b749aca798785553045fd0f56302a003\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:53.021299 kubelet[2501]: I0212 19:37:53.021303 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/b749aca798785553045fd0f56302a003-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.2-a-04a5975e1d\" (UID: \"b749aca798785553045fd0f56302a003\") " pod="kube-system/kube-apiserver-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:53.021497 kubelet[2501]: I0212 19:37:53.021322 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-ca-certs\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:53.021497 kubelet[2501]: I0212 19:37:53.021340 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:53.021497 kubelet[2501]: I0212 19:37:53.021359 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:53.021497 kubelet[2501]: I0212 19:37:53.021380 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/41054977f0f7210187b7561c319502f4-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.2-a-04a5975e1d\" (UID: \"41054977f0f7210187b7561c319502f4\") " pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" Feb 12 19:37:53.579627 kubelet[2501]: I0212 19:37:53.579574 2501 apiserver.go:52] "Watching apiserver" Feb 12 19:37:53.619458 kubelet[2501]: I0212 19:37:53.619413 2501 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Feb 12 19:37:53.921168 kubelet[2501]: I0212 19:37:53.921057 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.2-a-04a5975e1d" podStartSLOduration=1.92098841 podCreationTimestamp="2024-02-12 19:37:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:37:53.879839092 +0000 UTC m=+1.384768744" watchObservedRunningTime="2024-02-12 19:37:53.92098841 +0000 UTC m=+1.425918062" Feb 12 19:37:53.950146 kubelet[2501]: I0212 19:37:53.950112 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.2-a-04a5975e1d" podStartSLOduration=1.950073894 podCreationTimestamp="2024-02-12 19:37:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:37:53.923853735 +0000 UTC m=+1.428783387" watchObservedRunningTime="2024-02-12 19:37:53.950073894 +0000 UTC m=+1.455003506" Feb 12 19:37:53.950282 kubelet[2501]: I0212 19:37:53.950211 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" podStartSLOduration=1.95019836 podCreationTimestamp="2024-02-12 19:37:52 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:37:53.949878955 +0000 UTC m=+1.454808567" watchObservedRunningTime="2024-02-12 19:37:53.95019836 +0000 UTC m=+1.455128012" Feb 12 19:37:54.998000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:37:55.004319 kernel: kauditd_printk_skb: 272 callbacks suppressed Feb 12 19:37:55.004383 kernel: audit: type=1400 audit(1707766674.998:955): avc: denied { watch } for pid=2381 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=521030 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Feb 12 19:37:54.998000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005f9a40 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:37:55.069277 kernel: audit: type=1300 audit(1707766674.998:955): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40005f9a40 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:37:54.998000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:37:55.102745 kernel: audit: type=1327 audit(1707766674.998:955): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:37:56.254005 sudo[1679]: pam_unix(sudo:session): session closed for user root Feb 12 19:37:56.253000 audit[1679]: USER_END pid=1679 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:56.258000 audit[1679]: CRED_DISP pid=1679 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:56.295239 kernel: audit: type=1106 audit(1707766676.253:956): pid=1679 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:56.295365 kernel: audit: type=1104 audit(1707766676.258:957): pid=1679 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Feb 12 19:37:56.353280 sshd[1676]: pam_unix(sshd:session): session closed for user core Feb 12 19:37:56.353000 audit[1676]: USER_END pid=1676 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:56.356485 systemd[1]: sshd@6-10.200.20.13:22-10.200.12.6:53110.service: Deactivated successfully. Feb 12 19:37:56.357257 systemd[1]: session-9.scope: Deactivated successfully. Feb 12 19:37:56.357419 systemd[1]: session-9.scope: Consumed 6.417s CPU time. Feb 12 19:37:56.353000 audit[1676]: CRED_DISP pid=1676 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:56.401550 kernel: audit: type=1106 audit(1707766676.353:958): pid=1676 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:56.401696 kernel: audit: type=1104 audit(1707766676.353:959): pid=1676 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:37:56.401881 systemd-logind[1365]: Session 9 logged out. Waiting for processes to exit. Feb 12 19:37:56.353000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.12.6:53110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:56.404254 systemd-logind[1365]: Removed session 9. Feb 12 19:37:56.423676 kernel: audit: type=1131 audit(1707766676.353:960): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.20.13:22-10.200.12.6:53110 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:37:57.690000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:57.692000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:57.734361 kernel: audit: type=1400 audit(1707766677.690:961): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:57.734458 kernel: audit: type=1400 audit(1707766677.692:962): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:57.692000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000a8e0e0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:37:57.692000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:37:57.692000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:57.692000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000a8e160 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:37:57.692000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:37:57.692000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:37:57.692000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4000a8e1e0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:37:57.692000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:37:57.690000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4000914400 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:37:57.690000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:38:07.890418 kubelet[2501]: I0212 19:38:07.890383 2501 kuberuntime_manager.go:1463] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Feb 12 19:38:07.890832 env[1376]: time="2024-02-12T19:38:07.890778562Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Feb 12 19:38:07.891194 kubelet[2501]: I0212 19:38:07.891174 2501 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Feb 12 19:38:08.066543 kubelet[2501]: I0212 19:38:08.066507 2501 topology_manager.go:215] "Topology Admit Handler" podUID="71dbc9fd-479e-4667-9880-bcd1426f6387" podNamespace="kube-system" podName="kube-proxy-mwr7t" Feb 12 19:38:08.071593 systemd[1]: Created slice kubepods-besteffort-pod71dbc9fd_479e_4667_9880_bcd1426f6387.slice. Feb 12 19:38:08.099280 kubelet[2501]: I0212 19:38:08.099253 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/71dbc9fd-479e-4667-9880-bcd1426f6387-xtables-lock\") pod \"kube-proxy-mwr7t\" (UID: \"71dbc9fd-479e-4667-9880-bcd1426f6387\") " pod="kube-system/kube-proxy-mwr7t" Feb 12 19:38:08.099503 kubelet[2501]: I0212 19:38:08.099491 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/71dbc9fd-479e-4667-9880-bcd1426f6387-kube-proxy\") pod \"kube-proxy-mwr7t\" (UID: \"71dbc9fd-479e-4667-9880-bcd1426f6387\") " pod="kube-system/kube-proxy-mwr7t" Feb 12 19:38:08.099627 kubelet[2501]: I0212 19:38:08.099616 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/71dbc9fd-479e-4667-9880-bcd1426f6387-lib-modules\") pod \"kube-proxy-mwr7t\" (UID: \"71dbc9fd-479e-4667-9880-bcd1426f6387\") " pod="kube-system/kube-proxy-mwr7t" Feb 12 19:38:08.099781 kubelet[2501]: I0212 19:38:08.099769 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rqpc7\" (UniqueName: \"kubernetes.io/projected/71dbc9fd-479e-4667-9880-bcd1426f6387-kube-api-access-rqpc7\") pod \"kube-proxy-mwr7t\" (UID: \"71dbc9fd-479e-4667-9880-bcd1426f6387\") " pod="kube-system/kube-proxy-mwr7t" Feb 12 19:38:08.209229 kubelet[2501]: E0212 19:38:08.209196 2501 projected.go:292] Couldn't get configMap kube-system/kube-root-ca.crt: configmap "kube-root-ca.crt" not found Feb 12 19:38:08.209229 kubelet[2501]: E0212 19:38:08.209232 2501 projected.go:198] Error preparing data for projected volume kube-api-access-rqpc7 for pod kube-system/kube-proxy-mwr7t: configmap "kube-root-ca.crt" not found Feb 12 19:38:08.209423 kubelet[2501]: E0212 19:38:08.209290 2501 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/projected/71dbc9fd-479e-4667-9880-bcd1426f6387-kube-api-access-rqpc7 podName:71dbc9fd-479e-4667-9880-bcd1426f6387 nodeName:}" failed. No retries permitted until 2024-02-12 19:38:08.709270232 +0000 UTC m=+16.214199844 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "kube-api-access-rqpc7" (UniqueName: "kubernetes.io/projected/71dbc9fd-479e-4667-9880-bcd1426f6387-kube-api-access-rqpc7") pod "kube-proxy-mwr7t" (UID: "71dbc9fd-479e-4667-9880-bcd1426f6387") : configmap "kube-root-ca.crt" not found Feb 12 19:38:08.335471 kubelet[2501]: I0212 19:38:08.335423 2501 topology_manager.go:215] "Topology Admit Handler" podUID="7257fa7c-d5a4-4651-a1ff-32ed43c6a10f" podNamespace="tigera-operator" podName="tigera-operator-55585899bf-njdmq" Feb 12 19:38:08.340113 systemd[1]: Created slice kubepods-besteffort-pod7257fa7c_d5a4_4651_a1ff_32ed43c6a10f.slice. Feb 12 19:38:08.402100 kubelet[2501]: I0212 19:38:08.402070 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/7257fa7c-d5a4-4651-a1ff-32ed43c6a10f-var-lib-calico\") pod \"tigera-operator-55585899bf-njdmq\" (UID: \"7257fa7c-d5a4-4651-a1ff-32ed43c6a10f\") " pod="tigera-operator/tigera-operator-55585899bf-njdmq" Feb 12 19:38:08.402304 kubelet[2501]: I0212 19:38:08.402293 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-wgxgc\" (UniqueName: \"kubernetes.io/projected/7257fa7c-d5a4-4651-a1ff-32ed43c6a10f-kube-api-access-wgxgc\") pod \"tigera-operator-55585899bf-njdmq\" (UID: \"7257fa7c-d5a4-4651-a1ff-32ed43c6a10f\") " pod="tigera-operator/tigera-operator-55585899bf-njdmq" Feb 12 19:38:08.644755 env[1376]: time="2024-02-12T19:38:08.644517437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-njdmq,Uid:7257fa7c-d5a4-4651-a1ff-32ed43c6a10f,Namespace:tigera-operator,Attempt:0,}" Feb 12 19:38:08.685484 env[1376]: time="2024-02-12T19:38:08.685414199Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:38:08.685719 env[1376]: time="2024-02-12T19:38:08.685648020Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:38:08.685822 env[1376]: time="2024-02-12T19:38:08.685798369Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:38:08.686081 env[1376]: time="2024-02-12T19:38:08.686029551Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/d8cae7e7b4b4ec550cb59b64af6fb14605f71a3a1162ab773660a6c31a76aac8 pid=2581 runtime=io.containerd.runc.v2 Feb 12 19:38:08.705433 systemd[1]: Started cri-containerd-d8cae7e7b4b4ec550cb59b64af6fb14605f71a3a1162ab773660a6c31a76aac8.scope. Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722738 kernel: kauditd_printk_skb: 10 callbacks suppressed Feb 12 19:38:08.722929 kernel: audit: type=1400 audit(1707766688.716:965): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.756814 kernel: audit: type=1400 audit(1707766688.716:966): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.756961 kernel: audit: type=1400 audit(1707766688.716:967): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.791284 kernel: audit: type=1400 audit(1707766688.716:968): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.808848 kernel: audit: type=1400 audit(1707766688.716:969): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.830411 kernel: audit: type=1400 audit(1707766688.716:970): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.847720 kernel: audit: type=1400 audit(1707766688.716:971): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.847811 kernel: audit: type=1400 audit(1707766688.716:972): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.882127 kernel: audit: type=1400 audit(1707766688.716:973): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.882219 kernel: audit: type=1400 audit(1707766688.716:974): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit: BPF prog-id=113 op=LOAD Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2581 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:08.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438636165376537623462346563353530636235396236346166366662 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2581 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:08.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438636165376537623462346563353530636235396236346166366662 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.716000 audit: BPF prog-id=114 op=LOAD Feb 12 19:38:08.716000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2581 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:08.716000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438636165376537623462346563353530636235396236346166366662 Feb 12 19:38:08.722000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.722000 audit: BPF prog-id=115 op=LOAD Feb 12 19:38:08.722000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2581 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:08.722000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438636165376537623462346563353530636235396236346166366662 Feb 12 19:38:08.739000 audit: BPF prog-id=115 op=UNLOAD Feb 12 19:38:08.739000 audit: BPF prog-id=114 op=UNLOAD Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { perfmon } for pid=2592 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit[2592]: AVC avc: denied { bpf } for pid=2592 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:08.739000 audit: BPF prog-id=116 op=LOAD Feb 12 19:38:08.739000 audit[2592]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2581 pid=2592 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:08.739000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6438636165376537623462346563353530636235396236346166366662 Feb 12 19:38:08.907769 env[1376]: time="2024-02-12T19:38:08.907723095Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-55585899bf-njdmq,Uid:7257fa7c-d5a4-4651-a1ff-32ed43c6a10f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"d8cae7e7b4b4ec550cb59b64af6fb14605f71a3a1162ab773660a6c31a76aac8\"" Feb 12 19:38:08.911662 env[1376]: time="2024-02-12T19:38:08.911630789Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\"" Feb 12 19:38:08.979200 env[1376]: time="2024-02-12T19:38:08.979161428Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mwr7t,Uid:71dbc9fd-479e-4667-9880-bcd1426f6387,Namespace:kube-system,Attempt:0,}" Feb 12 19:38:09.020737 env[1376]: time="2024-02-12T19:38:09.020608619Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:38:09.020737 env[1376]: time="2024-02-12T19:38:09.020647696Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:38:09.020737 env[1376]: time="2024-02-12T19:38:09.020657856Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:38:09.021045 env[1376]: time="2024-02-12T19:38:09.021007749Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/b4e2b9af6829e8c9b99f541581029bfa98f5ed1330a857da71ccda40eb545013 pid=2624 runtime=io.containerd.runc.v2 Feb 12 19:38:09.031765 systemd[1]: Started cri-containerd-b4e2b9af6829e8c9b99f541581029bfa98f5ed1330a857da71ccda40eb545013.scope. Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.042000 audit: BPF prog-id=117 op=LOAD Feb 12 19:38:09.043000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.043000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2624 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653262396166363832396538633962393966353431353831303239 Feb 12 19:38:09.043000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.043000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2624 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653262396166363832396538633962393966353431353831303239 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.044000 audit: BPF prog-id=118 op=LOAD Feb 12 19:38:09.044000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2624 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.044000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653262396166363832396538633962393966353431353831303239 Feb 12 19:38:09.045000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.045000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.045000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.045000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.045000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.045000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.045000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.045000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.045000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.045000 audit: BPF prog-id=119 op=LOAD Feb 12 19:38:09.045000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2624 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.045000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653262396166363832396538633962393966353431353831303239 Feb 12 19:38:09.045000 audit: BPF prog-id=119 op=UNLOAD Feb 12 19:38:09.045000 audit: BPF prog-id=118 op=UNLOAD Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { perfmon } for pid=2631 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit[2631]: AVC avc: denied { bpf } for pid=2631 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.046000 audit: BPF prog-id=120 op=LOAD Feb 12 19:38:09.046000 audit[2631]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2624 pid=2631 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.046000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234653262396166363832396538633962393966353431353831303239 Feb 12 19:38:09.061105 env[1376]: time="2024-02-12T19:38:09.061063842Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-mwr7t,Uid:71dbc9fd-479e-4667-9880-bcd1426f6387,Namespace:kube-system,Attempt:0,} returns sandbox id \"b4e2b9af6829e8c9b99f541581029bfa98f5ed1330a857da71ccda40eb545013\"" Feb 12 19:38:09.064907 env[1376]: time="2024-02-12T19:38:09.064833473Z" level=info msg="CreateContainer within sandbox \"b4e2b9af6829e8c9b99f541581029bfa98f5ed1330a857da71ccda40eb545013\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Feb 12 19:38:09.114178 env[1376]: time="2024-02-12T19:38:09.114129378Z" level=info msg="CreateContainer within sandbox \"b4e2b9af6829e8c9b99f541581029bfa98f5ed1330a857da71ccda40eb545013\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"fcdc0c16cd7464e79a4b0f789c3a8dbe9221ee47be71b4646b634300f415ee66\"" Feb 12 19:38:09.116563 env[1376]: time="2024-02-12T19:38:09.115973797Z" level=info msg="StartContainer for \"fcdc0c16cd7464e79a4b0f789c3a8dbe9221ee47be71b4646b634300f415ee66\"" Feb 12 19:38:09.129707 systemd[1]: Started cri-containerd-fcdc0c16cd7464e79a4b0f789c3a8dbe9221ee47be71b4646b634300f415ee66.scope. Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2624 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663646330633136636437343634653739613462306637383963336138 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit: BPF prog-id=121 op=LOAD Feb 12 19:38:09.150000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2624 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663646330633136636437343634653739613462306637383963336138 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit: BPF prog-id=122 op=LOAD Feb 12 19:38:09.150000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2624 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663646330633136636437343634653739613462306637383963336138 Feb 12 19:38:09.150000 audit: BPF prog-id=122 op=UNLOAD Feb 12 19:38:09.150000 audit: BPF prog-id=121 op=UNLOAD Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { perfmon } for pid=2665 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit[2665]: AVC avc: denied { bpf } for pid=2665 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:09.150000 audit: BPF prog-id=123 op=LOAD Feb 12 19:38:09.150000 audit[2665]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2624 pid=2665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6663646330633136636437343634653739613462306637383963336138 Feb 12 19:38:09.175922 env[1376]: time="2024-02-12T19:38:09.175863331Z" level=info msg="StartContainer for \"fcdc0c16cd7464e79a4b0f789c3a8dbe9221ee47be71b4646b634300f415ee66\" returns successfully" Feb 12 19:38:09.224000 audit[2715]: NETFILTER_CFG table=mangle:41 family=2 entries=1 op=nft_register_chain pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.224000 audit[2715]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffffc43390 a2=0 a3=ffff917516c0 items=0 ppid=2675 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.224000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:38:09.226000 audit[2717]: NETFILTER_CFG table=nat:42 family=2 entries=1 op=nft_register_chain pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.226000 audit[2717]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffddd49ff0 a2=0 a3=ffff8b3a16c0 items=0 ppid=2675 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.226000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:38:09.228000 audit[2718]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2718 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.228000 audit[2718]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffc6bc6ff0 a2=0 a3=ffffba3cd6c0 items=0 ppid=2675 pid=2718 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.228000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:38:09.231000 audit[2716]: NETFILTER_CFG table=mangle:44 family=10 entries=1 op=nft_register_chain pid=2716 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.231000 audit[2716]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffd1d18760 a2=0 a3=ffffaf08f6c0 items=0 ppid=2675 pid=2716 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.231000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Feb 12 19:38:09.232000 audit[2719]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2719 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.232000 audit[2719]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffff06dbf00 a2=0 a3=ffff98e916c0 items=0 ppid=2675 pid=2719 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.232000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Feb 12 19:38:09.233000 audit[2720]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2720 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.233000 audit[2720]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff0c2d3b0 a2=0 a3=ffff992366c0 items=0 ppid=2675 pid=2720 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.233000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Feb 12 19:38:09.327000 audit[2721]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2721 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.327000 audit[2721]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffc81284e0 a2=0 a3=ffff944016c0 items=0 ppid=2675 pid=2721 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.327000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:38:09.329000 audit[2723]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.329000 audit[2723]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc6014fc0 a2=0 a3=ffff9f3806c0 items=0 ppid=2675 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.329000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Feb 12 19:38:09.333000 audit[2726]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2726 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.333000 audit[2726]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=752 a0=3 a1=ffffc6b80f70 a2=0 a3=ffff84ae36c0 items=0 ppid=2675 pid=2726 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.333000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Feb 12 19:38:09.334000 audit[2727]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2727 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.334000 audit[2727]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd6c12030 a2=0 a3=ffffb46406c0 items=0 ppid=2675 pid=2727 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.334000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:38:09.336000 audit[2729]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2729 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.336000 audit[2729]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffc7a00750 a2=0 a3=ffffb0adc6c0 items=0 ppid=2675 pid=2729 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.336000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:38:09.337000 audit[2730]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_chain pid=2730 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.337000 audit[2730]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd2a067d0 a2=0 a3=ffff9d7246c0 items=0 ppid=2675 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.337000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:38:09.339000 audit[2732]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_rule pid=2732 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.339000 audit[2732]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe15b48b0 a2=0 a3=ffff8b8a56c0 items=0 ppid=2675 pid=2732 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.339000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:38:09.342000 audit[2735]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2735 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.342000 audit[2735]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffe034d180 a2=0 a3=ffff9f3116c0 items=0 ppid=2675 pid=2735 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.342000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Feb 12 19:38:09.343000 audit[2736]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2736 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.343000 audit[2736]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffec4f25d0 a2=0 a3=ffff9ce986c0 items=0 ppid=2675 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.343000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:38:09.346000 audit[2738]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2738 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.346000 audit[2738]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffee6e88c0 a2=0 a3=ffff8989b6c0 items=0 ppid=2675 pid=2738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.346000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:38:09.347000 audit[2739]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_chain pid=2739 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.347000 audit[2739]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=ffffe0d05f80 a2=0 a3=ffff97e286c0 items=0 ppid=2675 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.347000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:38:09.349000 audit[2741]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_rule pid=2741 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.349000 audit[2741]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffeeb36070 a2=0 a3=ffff856886c0 items=0 ppid=2675 pid=2741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.349000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:38:09.352000 audit[2744]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2744 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.352000 audit[2744]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd160d940 a2=0 a3=ffff8c2246c0 items=0 ppid=2675 pid=2744 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.352000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:38:09.355000 audit[2747]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2747 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.355000 audit[2747]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffd081a3c0 a2=0 a3=ffff91e8c6c0 items=0 ppid=2675 pid=2747 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.355000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:38:09.357000 audit[2748]: NETFILTER_CFG table=nat:61 family=2 entries=1 op=nft_register_chain pid=2748 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.357000 audit[2748]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffdcbb9610 a2=0 a3=ffff8d2946c0 items=0 ppid=2675 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.357000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:38:09.360000 audit[2750]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_rule pid=2750 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.360000 audit[2750]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=524 a0=3 a1=ffffdebf2200 a2=0 a3=ffff82c146c0 items=0 ppid=2675 pid=2750 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.360000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:38:09.363000 audit[2753]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2753 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.363000 audit[2753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=fffffd5eac40 a2=0 a3=ffffafd826c0 items=0 ppid=2675 pid=2753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.363000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:38:09.364000 audit[2754]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2754 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.364000 audit[2754]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffd49916a0 a2=0 a3=ffffa6f1f6c0 items=0 ppid=2675 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.364000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:38:09.367000 audit[2756]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Feb 12 19:38:09.367000 audit[2756]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=532 a0=3 a1=ffffe95806d0 a2=0 a3=ffff8a8be6c0 items=0 ppid=2675 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.367000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:38:09.474000 audit[2762]: NETFILTER_CFG table=filter:66 family=2 entries=8 op=nft_register_rule pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:09.474000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=4956 a0=3 a1=ffffd3bdbdd0 a2=0 a3=ffffa4a036c0 items=0 ppid=2675 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.474000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:09.499000 audit[2762]: NETFILTER_CFG table=nat:67 family=2 entries=14 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:09.499000 audit[2762]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5340 a0=3 a1=ffffd3bdbdd0 a2=0 a3=ffffa4a036c0 items=0 ppid=2675 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.499000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:09.500000 audit[2767]: NETFILTER_CFG table=filter:68 family=10 entries=1 op=nft_register_chain pid=2767 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.500000 audit[2767]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=108 a0=3 a1=ffffdfb8bd10 a2=0 a3=ffffb14e46c0 items=0 ppid=2675 pid=2767 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.500000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Feb 12 19:38:09.503000 audit[2769]: NETFILTER_CFG table=filter:69 family=10 entries=2 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.503000 audit[2769]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffdfdc12e0 a2=0 a3=ffffae11c6c0 items=0 ppid=2675 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.503000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Feb 12 19:38:09.506000 audit[2772]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.506000 audit[2772]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=836 a0=3 a1=ffffca25b720 a2=0 a3=ffffa0ef66c0 items=0 ppid=2675 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.506000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Feb 12 19:38:09.507000 audit[2773]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2773 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.507000 audit[2773]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffe2541e80 a2=0 a3=ffffbee616c0 items=0 ppid=2675 pid=2773 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.507000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Feb 12 19:38:09.509000 audit[2775]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_rule pid=2775 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.509000 audit[2775]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd292e740 a2=0 a3=ffff9790d6c0 items=0 ppid=2675 pid=2775 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.509000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Feb 12 19:38:09.510000 audit[2776]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_chain pid=2776 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.510000 audit[2776]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffde9b9aa0 a2=0 a3=ffff89e936c0 items=0 ppid=2675 pid=2776 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.510000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Feb 12 19:38:09.512000 audit[2778]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_rule pid=2778 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.512000 audit[2778]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=744 a0=3 a1=ffffcf4a3680 a2=0 a3=ffff8aadd6c0 items=0 ppid=2675 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.512000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Feb 12 19:38:09.521000 audit[2781]: NETFILTER_CFG table=filter:75 family=10 entries=2 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.521000 audit[2781]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=828 a0=3 a1=ffffe4a6c400 a2=0 a3=ffff8d7816c0 items=0 ppid=2675 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.521000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Feb 12 19:38:09.522000 audit[2782]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2782 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.522000 audit[2782]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd81ecf0 a2=0 a3=ffffbf5b16c0 items=0 ppid=2675 pid=2782 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.522000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Feb 12 19:38:09.524000 audit[2784]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2784 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.524000 audit[2784]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=528 a0=3 a1=ffffd00eb160 a2=0 a3=ffffafa2a6c0 items=0 ppid=2675 pid=2784 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.524000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Feb 12 19:38:09.525000 audit[2785]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_chain pid=2785 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.525000 audit[2785]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=104 a0=3 a1=fffff0573c30 a2=0 a3=ffffae1216c0 items=0 ppid=2675 pid=2785 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.525000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Feb 12 19:38:09.527000 audit[2787]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_rule pid=2787 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.527000 audit[2787]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc89ff300 a2=0 a3=ffffa2cb06c0 items=0 ppid=2675 pid=2787 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.527000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Feb 12 19:38:09.530000 audit[2790]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2790 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.530000 audit[2790]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc5f79c00 a2=0 a3=ffffaf80d6c0 items=0 ppid=2675 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.530000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Feb 12 19:38:09.533000 audit[2793]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2793 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.533000 audit[2793]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=748 a0=3 a1=ffffc6e4c6d0 a2=0 a3=ffffbe18d6c0 items=0 ppid=2675 pid=2793 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.533000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Feb 12 19:38:09.534000 audit[2794]: NETFILTER_CFG table=nat:82 family=10 entries=1 op=nft_register_chain pid=2794 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.534000 audit[2794]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=96 a0=3 a1=ffffe93f1da0 a2=0 a3=ffffb5e5e6c0 items=0 ppid=2675 pid=2794 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.534000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Feb 12 19:38:09.536000 audit[2796]: NETFILTER_CFG table=nat:83 family=10 entries=2 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.536000 audit[2796]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=600 a0=3 a1=ffffd46eb1c0 a2=0 a3=ffff8d7166c0 items=0 ppid=2675 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.536000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:38:09.538000 audit[2799]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2799 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.538000 audit[2799]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=608 a0=3 a1=ffffeba90760 a2=0 a3=ffffb78206c0 items=0 ppid=2675 pid=2799 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.538000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Feb 12 19:38:09.540000 audit[2800]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2800 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.540000 audit[2800]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=fffffd90eea0 a2=0 a3=ffffaa6a16c0 items=0 ppid=2675 pid=2800 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.540000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Feb 12 19:38:09.542000 audit[2802]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2802 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.542000 audit[2802]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=612 a0=3 a1=ffffd34139e0 a2=0 a3=ffff816786c0 items=0 ppid=2675 pid=2802 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.542000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Feb 12 19:38:09.543000 audit[2803]: NETFILTER_CFG table=filter:87 family=10 entries=1 op=nft_register_chain pid=2803 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.543000 audit[2803]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=100 a0=3 a1=ffffc4f937b0 a2=0 a3=ffffaf8136c0 items=0 ppid=2675 pid=2803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.543000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Feb 12 19:38:09.545000 audit[2805]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_rule pid=2805 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.545000 audit[2805]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffc42f0de0 a2=0 a3=ffff9a8c46c0 items=0 ppid=2675 pid=2805 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.545000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:38:09.547000 audit[2808]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2808 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Feb 12 19:38:09.547000 audit[2808]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=228 a0=3 a1=ffffd956cf20 a2=0 a3=ffff8e06c6c0 items=0 ppid=2675 pid=2808 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.547000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Feb 12 19:38:09.550000 audit[2810]: NETFILTER_CFG table=filter:90 family=10 entries=3 op=nft_register_rule pid=2810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:38:09.550000 audit[2810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1916 a0=3 a1=ffffdeb4a1c0 a2=0 a3=ffff9da5e6c0 items=0 ppid=2675 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.550000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:09.550000 audit[2810]: NETFILTER_CFG table=nat:91 family=10 entries=7 op=nft_register_chain pid=2810 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Feb 12 19:38:09.550000 audit[2810]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=1968 a0=3 a1=ffffdeb4a1c0 a2=0 a3=ffff9da5e6c0 items=0 ppid=2675 pid=2810 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:09.550000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:09.788012 kubelet[2501]: I0212 19:38:09.786308 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-mwr7t" podStartSLOduration=1.7862635500000001 podCreationTimestamp="2024-02-12 19:38:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:38:09.786133 +0000 UTC m=+17.291062612" watchObservedRunningTime="2024-02-12 19:38:09.78626355 +0000 UTC m=+17.291193202" Feb 12 19:38:10.833202 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1043562728.mount: Deactivated successfully. Feb 12 19:38:11.827394 env[1376]: time="2024-02-12T19:38:11.827350586Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:11.835012 env[1376]: time="2024-02-12T19:38:11.834970786Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:11.843808 env[1376]: time="2024-02-12T19:38:11.843745462Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.32.3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:11.867726 env[1376]: time="2024-02-12T19:38:11.867657825Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:715ac9a30f8a9579e44258af20de354715429e11836b493918e9e1a696e9b028,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:11.868954 env[1376]: time="2024-02-12T19:38:11.868909493Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.32.3\" returns image reference \"sha256:c7a10ec867a90652f951a6ba5a12efb94165e0a1c9b72167810d1065e57d768f\"" Feb 12 19:38:11.871979 env[1376]: time="2024-02-12T19:38:11.871790561Z" level=info msg="CreateContainer within sandbox \"d8cae7e7b4b4ec550cb59b64af6fb14605f71a3a1162ab773660a6c31a76aac8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Feb 12 19:38:11.926214 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3962350741.mount: Deactivated successfully. Feb 12 19:38:11.931079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount623247765.mount: Deactivated successfully. Feb 12 19:38:11.948780 env[1376]: time="2024-02-12T19:38:11.948735507Z" level=info msg="CreateContainer within sandbox \"d8cae7e7b4b4ec550cb59b64af6fb14605f71a3a1162ab773660a6c31a76aac8\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc\"" Feb 12 19:38:11.951025 env[1376]: time="2024-02-12T19:38:11.949658679Z" level=info msg="StartContainer for \"55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc\"" Feb 12 19:38:11.967609 systemd[1]: Started cri-containerd-55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc.scope. Feb 12 19:38:11.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.982000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.982000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit: BPF prog-id=124 op=LOAD Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=2581 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:11.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535626538393535363961633638623034633733653334313662306664 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2581 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:11.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535626538393535363961633638623034633733653334313662306664 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.983000 audit: BPF prog-id=125 op=LOAD Feb 12 19:38:11.983000 audit[2819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2581 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:11.983000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535626538393535363961633638623034633733653334313662306664 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit: BPF prog-id=126 op=LOAD Feb 12 19:38:11.984000 audit[2819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2581 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:11.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535626538393535363961633638623034633733653334313662306664 Feb 12 19:38:11.984000 audit: BPF prog-id=126 op=UNLOAD Feb 12 19:38:11.984000 audit: BPF prog-id=125 op=UNLOAD Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { perfmon } for pid=2819 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit[2819]: AVC avc: denied { bpf } for pid=2819 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:11.984000 audit: BPF prog-id=127 op=LOAD Feb 12 19:38:11.984000 audit[2819]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2581 pid=2819 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:11.984000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535626538393535363961633638623034633733653334313662306664 Feb 12 19:38:12.000029 env[1376]: time="2024-02-12T19:38:11.999976662Z" level=info msg="StartContainer for \"55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc\" returns successfully" Feb 12 19:38:14.660000 audit[2850]: NETFILTER_CFG table=filter:92 family=2 entries=15 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:14.667400 kernel: kauditd_printk_skb: 357 callbacks suppressed Feb 12 19:38:14.667522 kernel: audit: type=1325 audit(1707766694.660:1076): table=filter:92 family=2 entries=15 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:14.660000 audit[2850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffeec90440 a2=0 a3=ffff8d8f86c0 items=0 ppid=2675 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:14.707942 kernel: audit: type=1300 audit(1707766694.660:1076): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffeec90440 a2=0 a3=ffff8d8f86c0 items=0 ppid=2675 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:14.660000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:14.722407 kernel: audit: type=1327 audit(1707766694.660:1076): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:14.661000 audit[2850]: NETFILTER_CFG table=nat:93 family=2 entries=12 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:14.736544 kernel: audit: type=1325 audit(1707766694.661:1077): table=nat:93 family=2 entries=12 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:14.736641 kernel: audit: type=1300 audit(1707766694.661:1077): arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffeec90440 a2=0 a3=ffff8d8f86c0 items=0 ppid=2675 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:14.661000 audit[2850]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffeec90440 a2=0 a3=ffff8d8f86c0 items=0 ppid=2675 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:14.661000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:14.778963 kernel: audit: type=1327 audit(1707766694.661:1077): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:14.707000 audit[2852]: NETFILTER_CFG table=filter:94 family=2 entries=16 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:14.797752 kernel: audit: type=1325 audit(1707766694.707:1078): table=filter:94 family=2 entries=16 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:14.707000 audit[2852]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffcbf2ef90 a2=0 a3=ffffbc1f26c0 items=0 ppid=2675 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:14.707000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:14.839334 kernel: audit: type=1300 audit(1707766694.707:1078): arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffcbf2ef90 a2=0 a3=ffffbc1f26c0 items=0 ppid=2675 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:14.839446 kernel: audit: type=1327 audit(1707766694.707:1078): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:14.798000 audit[2852]: NETFILTER_CFG table=nat:95 family=2 entries=12 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:14.853409 kernel: audit: type=1325 audit(1707766694.798:1079): table=nat:95 family=2 entries=12 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:14.798000 audit[2852]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffcbf2ef90 a2=0 a3=ffffbc1f26c0 items=0 ppid=2675 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:14.798000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:14.856368 kubelet[2501]: I0212 19:38:14.856340 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-55585899bf-njdmq" podStartSLOduration=3.897796745 podCreationTimestamp="2024-02-12 19:38:08 +0000 UTC" firstStartedPulling="2024-02-12 19:38:08.910903726 +0000 UTC m=+16.415833378" lastFinishedPulling="2024-02-12 19:38:11.869398257 +0000 UTC m=+19.374327909" observedRunningTime="2024-02-12 19:38:12.792866291 +0000 UTC m=+20.297795943" watchObservedRunningTime="2024-02-12 19:38:14.856291276 +0000 UTC m=+22.361220888" Feb 12 19:38:14.856966 kubelet[2501]: I0212 19:38:14.856946 2501 topology_manager.go:215] "Topology Admit Handler" podUID="2ed514f6-e537-4181-b36a-26e7c3c6abde" podNamespace="calico-system" podName="calico-typha-5896b5676-2rk2n" Feb 12 19:38:14.861801 systemd[1]: Created slice kubepods-besteffort-pod2ed514f6_e537_4181_b36a_26e7c3c6abde.slice. Feb 12 19:38:14.930310 kubelet[2501]: I0212 19:38:14.930282 2501 topology_manager.go:215] "Topology Admit Handler" podUID="4a7b6769-4e44-44e8-8b05-7f9597932c12" podNamespace="calico-system" podName="calico-node-wxqgc" Feb 12 19:38:14.935108 systemd[1]: Created slice kubepods-besteffort-pod4a7b6769_4e44_44e8_8b05_7f9597932c12.slice. Feb 12 19:38:14.939731 kubelet[2501]: I0212 19:38:14.939699 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/2ed514f6-e537-4181-b36a-26e7c3c6abde-tigera-ca-bundle\") pod \"calico-typha-5896b5676-2rk2n\" (UID: \"2ed514f6-e537-4181-b36a-26e7c3c6abde\") " pod="calico-system/calico-typha-5896b5676-2rk2n" Feb 12 19:38:14.939889 kubelet[2501]: I0212 19:38:14.939863 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-2vcw9\" (UniqueName: \"kubernetes.io/projected/2ed514f6-e537-4181-b36a-26e7c3c6abde-kube-api-access-2vcw9\") pod \"calico-typha-5896b5676-2rk2n\" (UID: \"2ed514f6-e537-4181-b36a-26e7c3c6abde\") " pod="calico-system/calico-typha-5896b5676-2rk2n" Feb 12 19:38:14.939969 kubelet[2501]: I0212 19:38:14.939951 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/2ed514f6-e537-4181-b36a-26e7c3c6abde-typha-certs\") pod \"calico-typha-5896b5676-2rk2n\" (UID: \"2ed514f6-e537-4181-b36a-26e7c3c6abde\") " pod="calico-system/calico-typha-5896b5676-2rk2n" Feb 12 19:38:15.040906 kubelet[2501]: I0212 19:38:15.040874 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/4a7b6769-4e44-44e8-8b05-7f9597932c12-var-lib-calico\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041082 kubelet[2501]: I0212 19:38:15.040924 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/4a7b6769-4e44-44e8-8b05-7f9597932c12-cni-net-dir\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041082 kubelet[2501]: I0212 19:38:15.040948 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/4a7b6769-4e44-44e8-8b05-7f9597932c12-cni-log-dir\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041082 kubelet[2501]: I0212 19:38:15.041006 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/4a7b6769-4e44-44e8-8b05-7f9597932c12-lib-modules\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041082 kubelet[2501]: I0212 19:38:15.041030 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/4a7b6769-4e44-44e8-8b05-7f9597932c12-node-certs\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041194 kubelet[2501]: I0212 19:38:15.041097 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/4a7b6769-4e44-44e8-8b05-7f9597932c12-flexvol-driver-host\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041194 kubelet[2501]: I0212 19:38:15.041119 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-csjcx\" (UniqueName: \"kubernetes.io/projected/4a7b6769-4e44-44e8-8b05-7f9597932c12-kube-api-access-csjcx\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041194 kubelet[2501]: I0212 19:38:15.041179 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/4a7b6769-4e44-44e8-8b05-7f9597932c12-xtables-lock\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041267 kubelet[2501]: I0212 19:38:15.041217 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/4a7b6769-4e44-44e8-8b05-7f9597932c12-var-run-calico\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041267 kubelet[2501]: I0212 19:38:15.041251 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/4a7b6769-4e44-44e8-8b05-7f9597932c12-policysync\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041315 kubelet[2501]: I0212 19:38:15.041274 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/4a7b6769-4e44-44e8-8b05-7f9597932c12-tigera-ca-bundle\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.041315 kubelet[2501]: I0212 19:38:15.041299 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/4a7b6769-4e44-44e8-8b05-7f9597932c12-cni-bin-dir\") pod \"calico-node-wxqgc\" (UID: \"4a7b6769-4e44-44e8-8b05-7f9597932c12\") " pod="calico-system/calico-node-wxqgc" Feb 12 19:38:15.047366 kubelet[2501]: I0212 19:38:15.045727 2501 topology_manager.go:215] "Topology Admit Handler" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" podNamespace="calico-system" podName="csi-node-driver-zl24r" Feb 12 19:38:15.047366 kubelet[2501]: E0212 19:38:15.045978 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl24r" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" Feb 12 19:38:15.142355 kubelet[2501]: I0212 19:38:15.142322 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/eef99c0d-631c-483b-800d-d16dee0a8718-registration-dir\") pod \"csi-node-driver-zl24r\" (UID: \"eef99c0d-631c-483b-800d-d16dee0a8718\") " pod="calico-system/csi-node-driver-zl24r" Feb 12 19:38:15.142487 kubelet[2501]: I0212 19:38:15.142392 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/eef99c0d-631c-483b-800d-d16dee0a8718-varrun\") pod \"csi-node-driver-zl24r\" (UID: \"eef99c0d-631c-483b-800d-d16dee0a8718\") " pod="calico-system/csi-node-driver-zl24r" Feb 12 19:38:15.142487 kubelet[2501]: I0212 19:38:15.142413 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/eef99c0d-631c-483b-800d-d16dee0a8718-socket-dir\") pod \"csi-node-driver-zl24r\" (UID: \"eef99c0d-631c-483b-800d-d16dee0a8718\") " pod="calico-system/csi-node-driver-zl24r" Feb 12 19:38:15.142551 kubelet[2501]: I0212 19:38:15.142510 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-cqzf6\" (UniqueName: \"kubernetes.io/projected/eef99c0d-631c-483b-800d-d16dee0a8718-kube-api-access-cqzf6\") pod \"csi-node-driver-zl24r\" (UID: \"eef99c0d-631c-483b-800d-d16dee0a8718\") " pod="calico-system/csi-node-driver-zl24r" Feb 12 19:38:15.142601 kubelet[2501]: I0212 19:38:15.142582 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/eef99c0d-631c-483b-800d-d16dee0a8718-kubelet-dir\") pod \"csi-node-driver-zl24r\" (UID: \"eef99c0d-631c-483b-800d-d16dee0a8718\") " pod="calico-system/csi-node-driver-zl24r" Feb 12 19:38:15.143882 kubelet[2501]: E0212 19:38:15.143862 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.143996 kubelet[2501]: W0212 19:38:15.143981 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.144075 kubelet[2501]: E0212 19:38:15.144064 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.145169 kubelet[2501]: E0212 19:38:15.145151 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.145277 kubelet[2501]: W0212 19:38:15.145263 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.145345 kubelet[2501]: E0212 19:38:15.145335 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.145734 kubelet[2501]: E0212 19:38:15.145718 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.145849 kubelet[2501]: W0212 19:38:15.145834 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.145915 kubelet[2501]: E0212 19:38:15.145906 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.146176 kubelet[2501]: E0212 19:38:15.146163 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.146265 kubelet[2501]: W0212 19:38:15.146252 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.146330 kubelet[2501]: E0212 19:38:15.146321 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.146647 kubelet[2501]: E0212 19:38:15.146634 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.146752 kubelet[2501]: W0212 19:38:15.146739 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.146827 kubelet[2501]: E0212 19:38:15.146818 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.147047 kubelet[2501]: E0212 19:38:15.147034 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.147135 kubelet[2501]: W0212 19:38:15.147123 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.147273 kubelet[2501]: E0212 19:38:15.147261 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.147418 kubelet[2501]: E0212 19:38:15.147407 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.147488 kubelet[2501]: W0212 19:38:15.147477 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.147626 kubelet[2501]: E0212 19:38:15.147614 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.147760 kubelet[2501]: E0212 19:38:15.147750 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.147843 kubelet[2501]: W0212 19:38:15.147831 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.147909 kubelet[2501]: E0212 19:38:15.147900 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.148167 kubelet[2501]: E0212 19:38:15.148155 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.148250 kubelet[2501]: W0212 19:38:15.148238 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.148310 kubelet[2501]: E0212 19:38:15.148300 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.148519 kubelet[2501]: E0212 19:38:15.148506 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.148601 kubelet[2501]: W0212 19:38:15.148589 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.148698 kubelet[2501]: E0212 19:38:15.148655 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.148967 kubelet[2501]: E0212 19:38:15.148953 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.149061 kubelet[2501]: W0212 19:38:15.149048 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.149125 kubelet[2501]: E0212 19:38:15.149117 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.149973 kubelet[2501]: E0212 19:38:15.149957 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.150087 kubelet[2501]: W0212 19:38:15.150073 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.150254 kubelet[2501]: E0212 19:38:15.150241 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.150411 kubelet[2501]: E0212 19:38:15.150400 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.150494 kubelet[2501]: W0212 19:38:15.150482 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.150556 kubelet[2501]: E0212 19:38:15.150546 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.158916 kubelet[2501]: E0212 19:38:15.158882 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.158916 kubelet[2501]: W0212 19:38:15.158910 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.159046 kubelet[2501]: E0212 19:38:15.158930 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.165051 env[1376]: time="2024-02-12T19:38:15.164639442Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5896b5676-2rk2n,Uid:2ed514f6-e537-4181-b36a-26e7c3c6abde,Namespace:calico-system,Attempt:0,}" Feb 12 19:38:15.165460 kubelet[2501]: E0212 19:38:15.165447 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.165538 kubelet[2501]: W0212 19:38:15.165525 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.165607 kubelet[2501]: E0212 19:38:15.165596 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.226699 env[1376]: time="2024-02-12T19:38:15.224472182Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:38:15.226699 env[1376]: time="2024-02-12T19:38:15.224509460Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:38:15.226699 env[1376]: time="2024-02-12T19:38:15.224519339Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:38:15.226699 env[1376]: time="2024-02-12T19:38:15.224885314Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5e2fc6401249de842cc23c29cf8502614301b7f1deeb34157d9713d1e1eae56f pid=2880 runtime=io.containerd.runc.v2 Feb 12 19:38:15.237733 env[1376]: time="2024-02-12T19:38:15.237661968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wxqgc,Uid:4a7b6769-4e44-44e8-8b05-7f9597932c12,Namespace:calico-system,Attempt:0,}" Feb 12 19:38:15.245203 kubelet[2501]: E0212 19:38:15.244195 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.245203 kubelet[2501]: W0212 19:38:15.244214 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245203 kubelet[2501]: E0212 19:38:15.244238 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.245203 kubelet[2501]: E0212 19:38:15.244422 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.245203 kubelet[2501]: W0212 19:38:15.244431 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245203 kubelet[2501]: E0212 19:38:15.244442 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.245203 kubelet[2501]: E0212 19:38:15.244579 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.245203 kubelet[2501]: W0212 19:38:15.244596 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245203 kubelet[2501]: E0212 19:38:15.244607 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.245203 kubelet[2501]: E0212 19:38:15.244764 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.244412 systemd[1]: Started cri-containerd-5e2fc6401249de842cc23c29cf8502614301b7f1deeb34157d9713d1e1eae56f.scope. Feb 12 19:38:15.245607 kubelet[2501]: W0212 19:38:15.244771 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245607 kubelet[2501]: E0212 19:38:15.244781 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.245607 kubelet[2501]: E0212 19:38:15.244933 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.245607 kubelet[2501]: W0212 19:38:15.244942 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245607 kubelet[2501]: E0212 19:38:15.244953 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.245607 kubelet[2501]: E0212 19:38:15.245090 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.245607 kubelet[2501]: W0212 19:38:15.245111 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245607 kubelet[2501]: E0212 19:38:15.245122 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.245607 kubelet[2501]: E0212 19:38:15.245235 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.245607 kubelet[2501]: W0212 19:38:15.245251 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245881 kubelet[2501]: E0212 19:38:15.245263 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.245881 kubelet[2501]: E0212 19:38:15.245385 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.245881 kubelet[2501]: W0212 19:38:15.245392 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245881 kubelet[2501]: E0212 19:38:15.245411 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.245881 kubelet[2501]: E0212 19:38:15.245569 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.245881 kubelet[2501]: W0212 19:38:15.245587 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245881 kubelet[2501]: E0212 19:38:15.245597 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.245881 kubelet[2501]: E0212 19:38:15.245759 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.245881 kubelet[2501]: W0212 19:38:15.245767 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.245881 kubelet[2501]: E0212 19:38:15.245782 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.246086 kubelet[2501]: E0212 19:38:15.245895 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.246086 kubelet[2501]: W0212 19:38:15.245911 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.246086 kubelet[2501]: E0212 19:38:15.245923 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.246086 kubelet[2501]: E0212 19:38:15.246036 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.246086 kubelet[2501]: W0212 19:38:15.246052 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.246086 kubelet[2501]: E0212 19:38:15.246063 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.251870 kubelet[2501]: E0212 19:38:15.246309 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.251870 kubelet[2501]: W0212 19:38:15.246324 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.251870 kubelet[2501]: E0212 19:38:15.246335 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.251870 kubelet[2501]: E0212 19:38:15.246468 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.251870 kubelet[2501]: W0212 19:38:15.246486 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.251870 kubelet[2501]: E0212 19:38:15.246497 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.251870 kubelet[2501]: E0212 19:38:15.246612 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.251870 kubelet[2501]: W0212 19:38:15.246628 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.251870 kubelet[2501]: E0212 19:38:15.246638 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.251870 kubelet[2501]: E0212 19:38:15.246784 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252182 kubelet[2501]: W0212 19:38:15.246792 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252182 kubelet[2501]: E0212 19:38:15.246809 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.252182 kubelet[2501]: E0212 19:38:15.246943 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252182 kubelet[2501]: W0212 19:38:15.246959 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252182 kubelet[2501]: E0212 19:38:15.246970 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.252182 kubelet[2501]: E0212 19:38:15.247311 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252182 kubelet[2501]: W0212 19:38:15.247320 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252182 kubelet[2501]: E0212 19:38:15.247333 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.252182 kubelet[2501]: E0212 19:38:15.247450 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252182 kubelet[2501]: W0212 19:38:15.247466 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252432 kubelet[2501]: E0212 19:38:15.247477 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.252432 kubelet[2501]: E0212 19:38:15.247588 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252432 kubelet[2501]: W0212 19:38:15.247594 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252432 kubelet[2501]: E0212 19:38:15.247614 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.252432 kubelet[2501]: E0212 19:38:15.247777 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252432 kubelet[2501]: W0212 19:38:15.247792 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252432 kubelet[2501]: E0212 19:38:15.247803 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.252432 kubelet[2501]: E0212 19:38:15.248712 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252432 kubelet[2501]: W0212 19:38:15.248724 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252432 kubelet[2501]: E0212 19:38:15.248743 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.252649 kubelet[2501]: E0212 19:38:15.248906 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252649 kubelet[2501]: W0212 19:38:15.248914 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252649 kubelet[2501]: E0212 19:38:15.248926 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.252649 kubelet[2501]: E0212 19:38:15.249119 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252649 kubelet[2501]: W0212 19:38:15.249129 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252649 kubelet[2501]: E0212 19:38:15.249142 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.252649 kubelet[2501]: E0212 19:38:15.249306 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.252649 kubelet[2501]: W0212 19:38:15.249314 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.252649 kubelet[2501]: E0212 19:38:15.249326 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.262748 kubelet[2501]: E0212 19:38:15.262718 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:15.262748 kubelet[2501]: W0212 19:38:15.262737 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:15.262899 kubelet[2501]: E0212 19:38:15.262758 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.281000 audit: BPF prog-id=128 op=LOAD Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2880 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565326663363430313234396465383432636332336332396366383530 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2880 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565326663363430313234396465383432636332336332396366383530 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit: BPF prog-id=129 op=LOAD Feb 12 19:38:15.282000 audit[2892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2880 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565326663363430313234396465383432636332336332396366383530 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit: BPF prog-id=130 op=LOAD Feb 12 19:38:15.282000 audit[2892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2880 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565326663363430313234396465383432636332336332396366383530 Feb 12 19:38:15.282000 audit: BPF prog-id=130 op=UNLOAD Feb 12 19:38:15.282000 audit: BPF prog-id=129 op=UNLOAD Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { perfmon } for pid=2892 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit[2892]: AVC avc: denied { bpf } for pid=2892 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.282000 audit: BPF prog-id=131 op=LOAD Feb 12 19:38:15.282000 audit[2892]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2880 pid=2892 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565326663363430313234396465383432636332336332396366383530 Feb 12 19:38:15.308125 env[1376]: time="2024-02-12T19:38:15.308065151Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-5896b5676-2rk2n,Uid:2ed514f6-e537-4181-b36a-26e7c3c6abde,Namespace:calico-system,Attempt:0,} returns sandbox id \"5e2fc6401249de842cc23c29cf8502614301b7f1deeb34157d9713d1e1eae56f\"" Feb 12 19:38:15.313893 env[1376]: time="2024-02-12T19:38:15.309714839Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\"" Feb 12 19:38:15.317160 env[1376]: time="2024-02-12T19:38:15.317107378Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:38:15.317313 env[1376]: time="2024-02-12T19:38:15.317289845Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:38:15.317411 env[1376]: time="2024-02-12T19:38:15.317391038Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:38:15.317643 env[1376]: time="2024-02-12T19:38:15.317608784Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/aae6251314dddd44a6a05d18468cbba62fe75de4f3ac1b09a004eb2fc869d5d4 pid=2948 runtime=io.containerd.runc.v2 Feb 12 19:38:15.331375 systemd[1]: Started cri-containerd-aae6251314dddd44a6a05d18468cbba62fe75de4f3ac1b09a004eb2fc869d5d4.scope. Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.349000 audit: BPF prog-id=132 op=LOAD Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2948 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653632353133313464646464343461366130356431383436386362 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2948 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653632353133313464646464343461366130356431383436386362 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit: BPF prog-id=133 op=LOAD Feb 12 19:38:15.350000 audit[2960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2948 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653632353133313464646464343461366130356431383436386362 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit: BPF prog-id=134 op=LOAD Feb 12 19:38:15.350000 audit[2960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2948 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653632353133313464646464343461366130356431383436386362 Feb 12 19:38:15.350000 audit: BPF prog-id=134 op=UNLOAD Feb 12 19:38:15.350000 audit: BPF prog-id=133 op=UNLOAD Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { perfmon } for pid=2960 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit[2960]: AVC avc: denied { bpf } for pid=2960 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:15.350000 audit: BPF prog-id=135 op=LOAD Feb 12 19:38:15.350000 audit[2960]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2948 pid=2960 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.350000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6161653632353133313464646464343461366130356431383436386362 Feb 12 19:38:15.367811 env[1376]: time="2024-02-12T19:38:15.367763701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-wxqgc,Uid:4a7b6769-4e44-44e8-8b05-7f9597932c12,Namespace:calico-system,Attempt:0,} returns sandbox id \"aae6251314dddd44a6a05d18468cbba62fe75de4f3ac1b09a004eb2fc869d5d4\"" Feb 12 19:38:15.859000 audit[2985]: NETFILTER_CFG table=filter:96 family=2 entries=16 op=nft_register_rule pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:15.859000 audit[2985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=ffffd9ca0110 a2=0 a3=ffff800c26c0 items=0 ppid=2675 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.859000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:15.859000 audit[2985]: NETFILTER_CFG table=nat:97 family=2 entries=12 op=nft_register_rule pid=2985 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:15.859000 audit[2985]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=ffffd9ca0110 a2=0 a3=ffff800c26c0 items=0 ppid=2675 pid=2985 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:15.859000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:16.625590 kubelet[2501]: E0212 19:38:16.625546 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl24r" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" Feb 12 19:38:16.718759 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1986221958.mount: Deactivated successfully. Feb 12 19:38:17.797929 env[1376]: time="2024-02-12T19:38:17.797873726Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:17.807966 env[1376]: time="2024-02-12T19:38:17.807919630Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:17.813740 env[1376]: time="2024-02-12T19:38:17.813706653Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:17.818834 env[1376]: time="2024-02-12T19:38:17.818793840Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:5f2d3b8c354a4eb6de46e786889913916e620c6c256982fb8d0f1a1d36a282bc,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:17.819500 env[1376]: time="2024-02-12T19:38:17.819469476Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.27.0\" returns image reference \"sha256:fba96c9caf161e105c76b559b06b4b2337b89b54833d69984209161d93145969\"" Feb 12 19:38:17.820243 env[1376]: time="2024-02-12T19:38:17.820212148Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\"" Feb 12 19:38:17.834117 env[1376]: time="2024-02-12T19:38:17.834078843Z" level=info msg="CreateContainer within sandbox \"5e2fc6401249de842cc23c29cf8502614301b7f1deeb34157d9713d1e1eae56f\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Feb 12 19:38:17.867562 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3225100779.mount: Deactivated successfully. Feb 12 19:38:17.887073 env[1376]: time="2024-02-12T19:38:17.887028826Z" level=info msg="CreateContainer within sandbox \"5e2fc6401249de842cc23c29cf8502614301b7f1deeb34157d9713d1e1eae56f\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"631765003078923d455f40583facfd1d09231f13e277e70db8700ebb122ff6a0\"" Feb 12 19:38:17.887985 env[1376]: time="2024-02-12T19:38:17.887870451Z" level=info msg="StartContainer for \"631765003078923d455f40583facfd1d09231f13e277e70db8700ebb122ff6a0\"" Feb 12 19:38:17.908876 systemd[1]: Started cri-containerd-631765003078923d455f40583facfd1d09231f13e277e70db8700ebb122ff6a0.scope. Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.924000 audit: BPF prog-id=136 op=LOAD Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2880 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:17.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633313736353030333037383932336434353566343035383366616366 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2880 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:17.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633313736353030333037383932336434353566343035383366616366 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit: BPF prog-id=137 op=LOAD Feb 12 19:38:17.925000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2880 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:17.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633313736353030333037383932336434353566343035383366616366 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit: BPF prog-id=138 op=LOAD Feb 12 19:38:17.925000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2880 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:17.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633313736353030333037383932336434353566343035383366616366 Feb 12 19:38:17.925000 audit: BPF prog-id=138 op=UNLOAD Feb 12 19:38:17.925000 audit: BPF prog-id=137 op=UNLOAD Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { perfmon } for pid=2999 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit[2999]: AVC avc: denied { bpf } for pid=2999 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:17.925000 audit: BPF prog-id=139 op=LOAD Feb 12 19:38:17.925000 audit[2999]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2880 pid=2999 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:17.925000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633313736353030333037383932336434353566343035383366616366 Feb 12 19:38:17.955131 env[1376]: time="2024-02-12T19:38:17.955081023Z" level=info msg="StartContainer for \"631765003078923d455f40583facfd1d09231f13e277e70db8700ebb122ff6a0\" returns successfully" Feb 12 19:38:18.625803 kubelet[2501]: E0212 19:38:18.625766 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl24r" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" Feb 12 19:38:18.820413 kubelet[2501]: I0212 19:38:18.820385 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-5896b5676-2rk2n" podStartSLOduration=2.30978127 podCreationTimestamp="2024-02-12 19:38:14 +0000 UTC" firstStartedPulling="2024-02-12 19:38:15.309280349 +0000 UTC m=+22.814210001" lastFinishedPulling="2024-02-12 19:38:17.819837892 +0000 UTC m=+25.324767584" observedRunningTime="2024-02-12 19:38:18.818550968 +0000 UTC m=+26.323480620" watchObservedRunningTime="2024-02-12 19:38:18.820338853 +0000 UTC m=+26.325268505" Feb 12 19:38:18.848023 kubelet[2501]: E0212 19:38:18.847985 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.848023 kubelet[2501]: W0212 19:38:18.848014 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.848188 kubelet[2501]: E0212 19:38:18.848036 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.848247 kubelet[2501]: E0212 19:38:18.848224 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.848247 kubelet[2501]: W0212 19:38:18.848242 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.848313 kubelet[2501]: E0212 19:38:18.848258 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.848478 kubelet[2501]: E0212 19:38:18.848455 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.848478 kubelet[2501]: W0212 19:38:18.848475 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.848607 kubelet[2501]: E0212 19:38:18.848489 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.848659 kubelet[2501]: E0212 19:38:18.848637 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.848659 kubelet[2501]: W0212 19:38:18.848656 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.848742 kubelet[2501]: E0212 19:38:18.848695 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.848899 kubelet[2501]: E0212 19:38:18.848877 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.848899 kubelet[2501]: W0212 19:38:18.848897 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.848977 kubelet[2501]: E0212 19:38:18.848910 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.849071 kubelet[2501]: E0212 19:38:18.849051 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.849071 kubelet[2501]: W0212 19:38:18.849069 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.849137 kubelet[2501]: E0212 19:38:18.849082 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.849289 kubelet[2501]: E0212 19:38:18.849268 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.849289 kubelet[2501]: W0212 19:38:18.849288 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.849375 kubelet[2501]: E0212 19:38:18.849301 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.849468 kubelet[2501]: E0212 19:38:18.849446 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.849468 kubelet[2501]: W0212 19:38:18.849466 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.849531 kubelet[2501]: E0212 19:38:18.849480 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.849693 kubelet[2501]: E0212 19:38:18.849658 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.849693 kubelet[2501]: W0212 19:38:18.849690 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.849771 kubelet[2501]: E0212 19:38:18.849703 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.849862 kubelet[2501]: E0212 19:38:18.849839 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.849862 kubelet[2501]: W0212 19:38:18.849858 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.849930 kubelet[2501]: E0212 19:38:18.849870 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.850017 kubelet[2501]: E0212 19:38:18.849996 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.850017 kubelet[2501]: W0212 19:38:18.850013 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.850087 kubelet[2501]: E0212 19:38:18.850041 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.850182 kubelet[2501]: E0212 19:38:18.850162 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.850182 kubelet[2501]: W0212 19:38:18.850178 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.850243 kubelet[2501]: E0212 19:38:18.850189 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.850333 kubelet[2501]: E0212 19:38:18.850314 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.850333 kubelet[2501]: W0212 19:38:18.850330 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.850399 kubelet[2501]: E0212 19:38:18.850341 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.850484 kubelet[2501]: E0212 19:38:18.850464 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.850484 kubelet[2501]: W0212 19:38:18.850482 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.850552 kubelet[2501]: E0212 19:38:18.850492 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.850628 kubelet[2501]: E0212 19:38:18.850608 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.850628 kubelet[2501]: W0212 19:38:18.850623 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.850712 kubelet[2501]: E0212 19:38:18.850633 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.866115 kubelet[2501]: E0212 19:38:18.866079 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.866115 kubelet[2501]: W0212 19:38:18.866103 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.866115 kubelet[2501]: E0212 19:38:18.866123 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.866494 kubelet[2501]: E0212 19:38:18.866474 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.866494 kubelet[2501]: W0212 19:38:18.866487 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.866593 kubelet[2501]: E0212 19:38:18.866503 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.866734 kubelet[2501]: E0212 19:38:18.866715 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.866734 kubelet[2501]: W0212 19:38:18.866730 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.866811 kubelet[2501]: E0212 19:38:18.866748 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.866971 kubelet[2501]: E0212 19:38:18.866953 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.866971 kubelet[2501]: W0212 19:38:18.866966 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.867061 kubelet[2501]: E0212 19:38:18.866981 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.867163 kubelet[2501]: E0212 19:38:18.867144 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.867163 kubelet[2501]: W0212 19:38:18.867158 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.867163 kubelet[2501]: E0212 19:38:18.867176 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.867386 kubelet[2501]: E0212 19:38:18.867370 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.867386 kubelet[2501]: W0212 19:38:18.867384 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.867475 kubelet[2501]: E0212 19:38:18.867401 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.867603 kubelet[2501]: E0212 19:38:18.867585 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.867603 kubelet[2501]: W0212 19:38:18.867600 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.867712 kubelet[2501]: E0212 19:38:18.867695 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.868044 kubelet[2501]: E0212 19:38:18.868023 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.868044 kubelet[2501]: W0212 19:38:18.868035 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.868140 kubelet[2501]: E0212 19:38:18.868104 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.868221 kubelet[2501]: E0212 19:38:18.868207 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.868221 kubelet[2501]: W0212 19:38:18.868219 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.868293 kubelet[2501]: E0212 19:38:18.868283 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.868439 kubelet[2501]: E0212 19:38:18.868425 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.868439 kubelet[2501]: W0212 19:38:18.868436 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.868526 kubelet[2501]: E0212 19:38:18.868450 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.868624 kubelet[2501]: E0212 19:38:18.868605 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.868624 kubelet[2501]: W0212 19:38:18.868617 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.868702 kubelet[2501]: E0212 19:38:18.868632 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.868850 kubelet[2501]: E0212 19:38:18.868834 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.868850 kubelet[2501]: W0212 19:38:18.868847 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.868942 kubelet[2501]: E0212 19:38:18.868861 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.869063 kubelet[2501]: E0212 19:38:18.869030 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.869063 kubelet[2501]: W0212 19:38:18.869044 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.869063 kubelet[2501]: E0212 19:38:18.869060 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.869317 kubelet[2501]: E0212 19:38:18.869304 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.869396 kubelet[2501]: W0212 19:38:18.869383 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.869476 kubelet[2501]: E0212 19:38:18.869465 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.869767 kubelet[2501]: E0212 19:38:18.869743 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.869767 kubelet[2501]: W0212 19:38:18.869760 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.869855 kubelet[2501]: E0212 19:38:18.869780 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.870008 kubelet[2501]: E0212 19:38:18.869992 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.870008 kubelet[2501]: W0212 19:38:18.870003 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.870090 kubelet[2501]: E0212 19:38:18.870014 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.870177 kubelet[2501]: E0212 19:38:18.870163 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.870177 kubelet[2501]: W0212 19:38:18.870175 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.870242 kubelet[2501]: E0212 19:38:18.870185 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:18.870821 kubelet[2501]: E0212 19:38:18.870803 2501 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Feb 12 19:38:18.870821 kubelet[2501]: W0212 19:38:18.870818 2501 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Feb 12 19:38:18.870911 kubelet[2501]: E0212 19:38:18.870830 2501 plugins.go:723] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Feb 12 19:38:19.291079 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1930305435.mount: Deactivated successfully. Feb 12 19:38:19.465210 env[1376]: time="2024-02-12T19:38:19.465143572Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:19.471986 env[1376]: time="2024-02-12T19:38:19.471951544Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:19.476711 env[1376]: time="2024-02-12T19:38:19.476661168Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:19.484706 env[1376]: time="2024-02-12T19:38:19.484650985Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:b05edbd1f80db4ada229e6001a666a7dd36bb6ab617143684fb3d28abfc4b71e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:19.485268 env[1376]: time="2024-02-12T19:38:19.485238948Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.27.0\" returns image reference \"sha256:cbddd33ed55a4a5c129e8f09945d426860425b9778d9402efe7bcefea7990a57\"" Feb 12 19:38:19.487190 env[1376]: time="2024-02-12T19:38:19.487161507Z" level=info msg="CreateContainer within sandbox \"aae6251314dddd44a6a05d18468cbba62fe75de4f3ac1b09a004eb2fc869d5d4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Feb 12 19:38:19.525567 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount937864527.mount: Deactivated successfully. Feb 12 19:38:19.543045 env[1376]: time="2024-02-12T19:38:19.542912041Z" level=info msg="CreateContainer within sandbox \"aae6251314dddd44a6a05d18468cbba62fe75de4f3ac1b09a004eb2fc869d5d4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"556858836e7cd46b8f35ecef46680e14bc491b0b3ba41fd69b3a391d6ac7f480\"" Feb 12 19:38:19.544075 env[1376]: time="2024-02-12T19:38:19.544044610Z" level=info msg="StartContainer for \"556858836e7cd46b8f35ecef46680e14bc491b0b3ba41fd69b3a391d6ac7f480\"" Feb 12 19:38:19.562857 systemd[1]: Started cri-containerd-556858836e7cd46b8f35ecef46680e14bc491b0b3ba41fd69b3a391d6ac7f480.scope. Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2948 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:19.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363835383833366537636434366238663335656365663436363830 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit: BPF prog-id=140 op=LOAD Feb 12 19:38:19.578000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2948 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:19.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363835383833366537636434366238663335656365663436363830 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit: BPF prog-id=141 op=LOAD Feb 12 19:38:19.578000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2948 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:19.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363835383833366537636434366238663335656365663436363830 Feb 12 19:38:19.578000 audit: BPF prog-id=141 op=UNLOAD Feb 12 19:38:19.578000 audit: BPF prog-id=140 op=UNLOAD Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { perfmon } for pid=3071 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit[3071]: AVC avc: denied { bpf } for pid=3071 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:19.578000 audit: BPF prog-id=142 op=LOAD Feb 12 19:38:19.578000 audit[3071]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2948 pid=3071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:19.578000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3535363835383833366537636434366238663335656365663436363830 Feb 12 19:38:19.599225 systemd[1]: cri-containerd-556858836e7cd46b8f35ecef46680e14bc491b0b3ba41fd69b3a391d6ac7f480.scope: Deactivated successfully. Feb 12 19:38:19.600476 env[1376]: time="2024-02-12T19:38:19.600381427Z" level=info msg="StartContainer for \"556858836e7cd46b8f35ecef46680e14bc491b0b3ba41fd69b3a391d6ac7f480\" returns successfully" Feb 12 19:38:19.602000 audit: BPF prog-id=142 op=UNLOAD Feb 12 19:38:19.811334 kubelet[2501]: I0212 19:38:19.811237 2501 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:38:20.528054 env[1376]: time="2024-02-12T19:38:20.527779792Z" level=info msg="shim disconnected" id=556858836e7cd46b8f35ecef46680e14bc491b0b3ba41fd69b3a391d6ac7f480 Feb 12 19:38:20.528054 env[1376]: time="2024-02-12T19:38:20.527827989Z" level=warning msg="cleaning up after shim disconnected" id=556858836e7cd46b8f35ecef46680e14bc491b0b3ba41fd69b3a391d6ac7f480 namespace=k8s.io Feb 12 19:38:20.528054 env[1376]: time="2024-02-12T19:38:20.527837908Z" level=info msg="cleaning up dead shim" Feb 12 19:38:20.534846 env[1376]: time="2024-02-12T19:38:20.534808518Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:38:20Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3112 runtime=io.containerd.runc.v2\n" Feb 12 19:38:20.625344 kubelet[2501]: E0212 19:38:20.625314 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl24r" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" Feb 12 19:38:20.818894 env[1376]: time="2024-02-12T19:38:20.818569799Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\"" Feb 12 19:38:22.238132 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3060032141.mount: Deactivated successfully. Feb 12 19:38:22.627155 kubelet[2501]: E0212 19:38:22.627052 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl24r" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" Feb 12 19:38:24.627904 kubelet[2501]: E0212 19:38:24.626245 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl24r" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" Feb 12 19:38:25.567262 env[1376]: time="2024-02-12T19:38:25.567217199Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:25.575728 env[1376]: time="2024-02-12T19:38:25.575697599Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:25.581964 env[1376]: time="2024-02-12T19:38:25.581927327Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:25.589378 env[1376]: time="2024-02-12T19:38:25.589349988Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:d943b4c23e82a39b0186a1a3b2fe8f728e543d503df72d7be521501a82b7e7b4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:25.589821 env[1376]: time="2024-02-12T19:38:25.589791203Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.27.0\" returns image reference \"sha256:9c9318f5fbf505fc3d84676966009a3887e58ea1e3eac10039e5a96dfceb254b\"" Feb 12 19:38:25.593793 env[1376]: time="2024-02-12T19:38:25.593753379Z" level=info msg="CreateContainer within sandbox \"aae6251314dddd44a6a05d18468cbba62fe75de4f3ac1b09a004eb2fc869d5d4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Feb 12 19:38:25.629189 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1845740866.mount: Deactivated successfully. Feb 12 19:38:25.647758 env[1376]: time="2024-02-12T19:38:25.647713168Z" level=info msg="CreateContainer within sandbox \"aae6251314dddd44a6a05d18468cbba62fe75de4f3ac1b09a004eb2fc869d5d4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"8352fca50c82dcb7e8beb7510838c1e58339ca5e356facf7da357eb9ed61f011\"" Feb 12 19:38:25.649587 env[1376]: time="2024-02-12T19:38:25.649556264Z" level=info msg="StartContainer for \"8352fca50c82dcb7e8beb7510838c1e58339ca5e356facf7da357eb9ed61f011\"" Feb 12 19:38:25.677936 systemd[1]: run-containerd-runc-k8s.io-8352fca50c82dcb7e8beb7510838c1e58339ca5e356facf7da357eb9ed61f011-runc.Y8hYc9.mount: Deactivated successfully. Feb 12 19:38:25.681172 systemd[1]: Started cri-containerd-8352fca50c82dcb7e8beb7510838c1e58339ca5e356facf7da357eb9ed61f011.scope. Feb 12 19:38:25.695000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.701020 kernel: kauditd_printk_skb: 223 callbacks suppressed Feb 12 19:38:25.701101 kernel: audit: type=1400 audit(1707766705.695:1143): avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.695000 audit[3133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2948 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:25.744484 kernel: audit: type=1300 audit(1707766705.695:1143): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=2948 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:25.695000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833353266636135306338326463623765386265623735313038333863 Feb 12 19:38:25.768626 kernel: audit: type=1327 audit(1707766705.695:1143): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833353266636135306338326463623765386265623735313038333863 Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.786757 kernel: audit: type=1400 audit(1707766705.698:1144): avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.803730 kernel: audit: type=1400 audit(1707766705.698:1144): avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.821078 kernel: audit: type=1400 audit(1707766705.698:1144): avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.839104 kernel: audit: type=1400 audit(1707766705.698:1144): avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.857732 kernel: audit: type=1400 audit(1707766705.698:1144): avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.875379 kernel: audit: type=1400 audit(1707766705.698:1144): avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.875449 kernel: audit: type=1400 audit(1707766705.698:1144): avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.892634 env[1376]: time="2024-02-12T19:38:25.892568887Z" level=info msg="StartContainer for \"8352fca50c82dcb7e8beb7510838c1e58339ca5e356facf7da357eb9ed61f011\" returns successfully" Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.698000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.698000 audit: BPF prog-id=143 op=LOAD Feb 12 19:38:25.698000 audit[3133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=2948 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:25.698000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833353266636135306338326463623765386265623735313038333863 Feb 12 19:38:25.700000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.700000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.700000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.700000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.700000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.700000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.700000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.700000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.700000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.700000 audit: BPF prog-id=144 op=LOAD Feb 12 19:38:25.700000 audit[3133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=2948 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:25.700000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833353266636135306338326463623765386265623735313038333863 Feb 12 19:38:25.717000 audit: BPF prog-id=144 op=UNLOAD Feb 12 19:38:25.718000 audit: BPF prog-id=143 op=UNLOAD Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { perfmon } for pid=3133 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit[3133]: AVC avc: denied { bpf } for pid=3133 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:25.718000 audit: BPF prog-id=145 op=LOAD Feb 12 19:38:25.718000 audit[3133]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=2948 pid=3133 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:25.718000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3833353266636135306338326463623765386265623735313038333863 Feb 12 19:38:26.627294 kubelet[2501]: E0212 19:38:26.627252 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-zl24r" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" Feb 12 19:38:27.145872 env[1376]: time="2024-02-12T19:38:27.145782699Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Feb 12 19:38:27.148435 systemd[1]: cri-containerd-8352fca50c82dcb7e8beb7510838c1e58339ca5e356facf7da357eb9ed61f011.scope: Deactivated successfully. Feb 12 19:38:27.152000 audit: BPF prog-id=145 op=UNLOAD Feb 12 19:38:27.164989 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-8352fca50c82dcb7e8beb7510838c1e58339ca5e356facf7da357eb9ed61f011-rootfs.mount: Deactivated successfully. Feb 12 19:38:27.208890 kubelet[2501]: I0212 19:38:27.207107 2501 kubelet_node_status.go:493] "Fast updating node status as it just became ready" Feb 12 19:38:27.554049 kubelet[2501]: I0212 19:38:27.226421 2501 topology_manager.go:215] "Topology Admit Handler" podUID="bd44a0a2-f8ab-4667-96c5-b482c6e09bd7" podNamespace="kube-system" podName="coredns-5dd5756b68-xw4f7" Feb 12 19:38:27.554049 kubelet[2501]: W0212 19:38:27.229661 2501 reflector.go:535] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.2-a-04a5975e1d" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-04a5975e1d' and this object Feb 12 19:38:27.554049 kubelet[2501]: E0212 19:38:27.229708 2501 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.2-a-04a5975e1d" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.2-a-04a5975e1d' and this object Feb 12 19:38:27.554049 kubelet[2501]: I0212 19:38:27.232836 2501 topology_manager.go:215] "Topology Admit Handler" podUID="812a9fa3-9521-4940-8543-1469cd25e9cb" podNamespace="kube-system" podName="coredns-5dd5756b68-g6kf2" Feb 12 19:38:27.554049 kubelet[2501]: I0212 19:38:27.232962 2501 topology_manager.go:215] "Topology Admit Handler" podUID="fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa" podNamespace="calico-system" podName="calico-kube-controllers-5c4bd6f65f-fl9fb" Feb 12 19:38:27.554049 kubelet[2501]: I0212 19:38:27.327429 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p8gb4\" (UniqueName: \"kubernetes.io/projected/812a9fa3-9521-4940-8543-1469cd25e9cb-kube-api-access-p8gb4\") pod \"coredns-5dd5756b68-g6kf2\" (UID: \"812a9fa3-9521-4940-8543-1469cd25e9cb\") " pod="kube-system/coredns-5dd5756b68-g6kf2" Feb 12 19:38:27.231356 systemd[1]: Created slice kubepods-burstable-podbd44a0a2_f8ab_4667_96c5_b482c6e09bd7.slice. Feb 12 19:38:27.554424 kubelet[2501]: I0212 19:38:27.327530 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-zvx55\" (UniqueName: \"kubernetes.io/projected/bd44a0a2-f8ab-4667-96c5-b482c6e09bd7-kube-api-access-zvx55\") pod \"coredns-5dd5756b68-xw4f7\" (UID: \"bd44a0a2-f8ab-4667-96c5-b482c6e09bd7\") " pod="kube-system/coredns-5dd5756b68-xw4f7" Feb 12 19:38:27.554424 kubelet[2501]: I0212 19:38:27.327561 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/812a9fa3-9521-4940-8543-1469cd25e9cb-config-volume\") pod \"coredns-5dd5756b68-g6kf2\" (UID: \"812a9fa3-9521-4940-8543-1469cd25e9cb\") " pod="kube-system/coredns-5dd5756b68-g6kf2" Feb 12 19:38:27.554424 kubelet[2501]: I0212 19:38:27.327598 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/bd44a0a2-f8ab-4667-96c5-b482c6e09bd7-config-volume\") pod \"coredns-5dd5756b68-xw4f7\" (UID: \"bd44a0a2-f8ab-4667-96c5-b482c6e09bd7\") " pod="kube-system/coredns-5dd5756b68-xw4f7" Feb 12 19:38:27.554424 kubelet[2501]: I0212 19:38:27.327623 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa-tigera-ca-bundle\") pod \"calico-kube-controllers-5c4bd6f65f-fl9fb\" (UID: \"fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa\") " pod="calico-system/calico-kube-controllers-5c4bd6f65f-fl9fb" Feb 12 19:38:27.554424 kubelet[2501]: I0212 19:38:27.327644 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-dz8x2\" (UniqueName: \"kubernetes.io/projected/fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa-kube-api-access-dz8x2\") pod \"calico-kube-controllers-5c4bd6f65f-fl9fb\" (UID: \"fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa\") " pod="calico-system/calico-kube-controllers-5c4bd6f65f-fl9fb" Feb 12 19:38:27.247808 systemd[1]: Created slice kubepods-besteffort-podfdf8bb27_2031_4a7b_b806_5f3c2a5baeaa.slice. Feb 12 19:38:27.252038 systemd[1]: Created slice kubepods-burstable-pod812a9fa3_9521_4940_8543_1469cd25e9cb.slice. Feb 12 19:38:27.859758 env[1376]: time="2024-02-12T19:38:27.859626155Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c4bd6f65f-fl9fb,Uid:fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa,Namespace:calico-system,Attempt:0,}" Feb 12 19:38:28.156293 env[1376]: time="2024-02-12T19:38:28.155982532Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xw4f7,Uid:bd44a0a2-f8ab-4667-96c5-b482c6e09bd7,Namespace:kube-system,Attempt:0,}" Feb 12 19:38:28.158333 env[1376]: time="2024-02-12T19:38:28.158301968Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-g6kf2,Uid:812a9fa3-9521-4940-8543-1469cd25e9cb,Namespace:kube-system,Attempt:0,}" Feb 12 19:38:28.314815 env[1376]: time="2024-02-12T19:38:28.314602482Z" level=info msg="shim disconnected" id=8352fca50c82dcb7e8beb7510838c1e58339ca5e356facf7da357eb9ed61f011 Feb 12 19:38:28.314815 env[1376]: time="2024-02-12T19:38:28.314643640Z" level=warning msg="cleaning up after shim disconnected" id=8352fca50c82dcb7e8beb7510838c1e58339ca5e356facf7da357eb9ed61f011 namespace=k8s.io Feb 12 19:38:28.314815 env[1376]: time="2024-02-12T19:38:28.314652599Z" level=info msg="cleaning up dead shim" Feb 12 19:38:28.321369 env[1376]: time="2024-02-12T19:38:28.321331200Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:38:28Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3186 runtime=io.containerd.runc.v2\n" Feb 12 19:38:28.421460 env[1376]: time="2024-02-12T19:38:28.421330662Z" level=error msg="Failed to destroy network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.422021 env[1376]: time="2024-02-12T19:38:28.421980587Z" level=error msg="encountered an error cleaning up failed sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.422110 env[1376]: time="2024-02-12T19:38:28.422037664Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c4bd6f65f-fl9fb,Uid:fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.422287 kubelet[2501]: E0212 19:38:28.422253 2501 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.422545 kubelet[2501]: E0212 19:38:28.422312 2501 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5c4bd6f65f-fl9fb" Feb 12 19:38:28.422545 kubelet[2501]: E0212 19:38:28.422332 2501 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-5c4bd6f65f-fl9fb" Feb 12 19:38:28.422545 kubelet[2501]: E0212 19:38:28.422380 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-5c4bd6f65f-fl9fb_calico-system(fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-5c4bd6f65f-fl9fb_calico-system(fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5c4bd6f65f-fl9fb" podUID="fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa" Feb 12 19:38:28.468481 env[1376]: time="2024-02-12T19:38:28.468427249Z" level=error msg="Failed to destroy network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.469801 env[1376]: time="2024-02-12T19:38:28.469249845Z" level=error msg="encountered an error cleaning up failed sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.469988 env[1376]: time="2024-02-12T19:38:28.469955967Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xw4f7,Uid:bd44a0a2-f8ab-4667-96c5-b482c6e09bd7,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.470365 kubelet[2501]: E0212 19:38:28.470338 2501 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.470460 kubelet[2501]: E0212 19:38:28.470397 2501 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-xw4f7" Feb 12 19:38:28.470460 kubelet[2501]: E0212 19:38:28.470418 2501 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-xw4f7" Feb 12 19:38:28.470535 kubelet[2501]: E0212 19:38:28.470474 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-xw4f7_kube-system(bd44a0a2-f8ab-4667-96c5-b482c6e09bd7)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-xw4f7_kube-system(bd44a0a2-f8ab-4667-96c5-b482c6e09bd7)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-xw4f7" podUID="bd44a0a2-f8ab-4667-96c5-b482c6e09bd7" Feb 12 19:38:28.474851 env[1376]: time="2024-02-12T19:38:28.474807706Z" level=error msg="Failed to destroy network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.475231 env[1376]: time="2024-02-12T19:38:28.475192445Z" level=error msg="encountered an error cleaning up failed sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.475296 env[1376]: time="2024-02-12T19:38:28.475263842Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-g6kf2,Uid:812a9fa3-9521-4940-8543-1469cd25e9cb,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.475857 kubelet[2501]: E0212 19:38:28.475499 2501 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.475857 kubelet[2501]: E0212 19:38:28.475553 2501 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-g6kf2" Feb 12 19:38:28.475857 kubelet[2501]: E0212 19:38:28.475572 2501 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-5dd5756b68-g6kf2" Feb 12 19:38:28.476010 kubelet[2501]: E0212 19:38:28.475822 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-5dd5756b68-g6kf2_kube-system(812a9fa3-9521-4940-8543-1469cd25e9cb)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-5dd5756b68-g6kf2_kube-system(812a9fa3-9521-4940-8543-1469cd25e9cb)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-g6kf2" podUID="812a9fa3-9521-4940-8543-1469cd25e9cb" Feb 12 19:38:28.630879 systemd[1]: Created slice kubepods-besteffort-podeef99c0d_631c_483b_800d_d16dee0a8718.slice. Feb 12 19:38:28.633893 env[1376]: time="2024-02-12T19:38:28.633839554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zl24r,Uid:eef99c0d-631c-483b-800d-d16dee0a8718,Namespace:calico-system,Attempt:0,}" Feb 12 19:38:28.711594 env[1376]: time="2024-02-12T19:38:28.711538495Z" level=error msg="Failed to destroy network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.712066 env[1376]: time="2024-02-12T19:38:28.712034308Z" level=error msg="encountered an error cleaning up failed sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.712233 env[1376]: time="2024-02-12T19:38:28.712204819Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zl24r,Uid:eef99c0d-631c-483b-800d-d16dee0a8718,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.712878 kubelet[2501]: E0212 19:38:28.712499 2501 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.712878 kubelet[2501]: E0212 19:38:28.712549 2501 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zl24r" Feb 12 19:38:28.712878 kubelet[2501]: E0212 19:38:28.712571 2501 kuberuntime_manager.go:1119] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-zl24r" Feb 12 19:38:28.713033 kubelet[2501]: E0212 19:38:28.712618 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-zl24r_calico-system(eef99c0d-631c-483b-800d-d16dee0a8718)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-zl24r_calico-system(eef99c0d-631c-483b-800d-d16dee0a8718)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zl24r" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" Feb 12 19:38:28.839017 kubelet[2501]: I0212 19:38:28.838633 2501 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:28.839760 env[1376]: time="2024-02-12T19:38:28.839726961Z" level=info msg="StopPodSandbox for \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\"" Feb 12 19:38:28.842332 kubelet[2501]: I0212 19:38:28.841634 2501 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:28.842431 env[1376]: time="2024-02-12T19:38:28.842153511Z" level=info msg="StopPodSandbox for \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\"" Feb 12 19:38:28.845430 kubelet[2501]: I0212 19:38:28.844977 2501 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:28.845769 env[1376]: time="2024-02-12T19:38:28.845742718Z" level=info msg="StopPodSandbox for \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\"" Feb 12 19:38:28.851399 env[1376]: time="2024-02-12T19:38:28.851356656Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\"" Feb 12 19:38:28.860706 kubelet[2501]: I0212 19:38:28.856261 2501 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:28.860823 env[1376]: time="2024-02-12T19:38:28.858636384Z" level=info msg="StopPodSandbox for \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\"" Feb 12 19:38:28.896265 env[1376]: time="2024-02-12T19:38:28.896198404Z" level=error msg="StopPodSandbox for \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\" failed" error="failed to destroy network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.896795 kubelet[2501]: E0212 19:38:28.896603 2501 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:28.896795 kubelet[2501]: E0212 19:38:28.896698 2501 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525"} Feb 12 19:38:28.896795 kubelet[2501]: E0212 19:38:28.896737 2501 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"bd44a0a2-f8ab-4667-96c5-b482c6e09bd7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:38:28.896795 kubelet[2501]: E0212 19:38:28.896775 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"bd44a0a2-f8ab-4667-96c5-b482c6e09bd7\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-xw4f7" podUID="bd44a0a2-f8ab-4667-96c5-b482c6e09bd7" Feb 12 19:38:28.922157 env[1376]: time="2024-02-12T19:38:28.922088332Z" level=error msg="StopPodSandbox for \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\" failed" error="failed to destroy network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.922379 kubelet[2501]: E0212 19:38:28.922353 2501 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:28.922448 kubelet[2501]: E0212 19:38:28.922401 2501 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4"} Feb 12 19:38:28.922448 kubelet[2501]: E0212 19:38:28.922439 2501 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"eef99c0d-631c-483b-800d-d16dee0a8718\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:38:28.922532 kubelet[2501]: E0212 19:38:28.922469 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"eef99c0d-631c-483b-800d-d16dee0a8718\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-zl24r" podUID="eef99c0d-631c-483b-800d-d16dee0a8718" Feb 12 19:38:28.926791 env[1376]: time="2024-02-12T19:38:28.926736922Z" level=error msg="StopPodSandbox for \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\" failed" error="failed to destroy network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.927277 kubelet[2501]: E0212 19:38:28.927137 2501 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:28.927277 kubelet[2501]: E0212 19:38:28.927187 2501 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb"} Feb 12 19:38:28.927277 kubelet[2501]: E0212 19:38:28.927219 2501 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:38:28.927277 kubelet[2501]: E0212 19:38:28.927258 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-5c4bd6f65f-fl9fb" podUID="fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa" Feb 12 19:38:28.931498 env[1376]: time="2024-02-12T19:38:28.931451068Z" level=error msg="StopPodSandbox for \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\" failed" error="failed to destroy network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Feb 12 19:38:28.931662 kubelet[2501]: E0212 19:38:28.931638 2501 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:28.931733 kubelet[2501]: E0212 19:38:28.931699 2501 kuberuntime_manager.go:1315] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e"} Feb 12 19:38:28.931733 kubelet[2501]: E0212 19:38:28.931730 2501 kuberuntime_manager.go:1028] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"812a9fa3-9521-4940-8543-1469cd25e9cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Feb 12 19:38:28.931806 kubelet[2501]: E0212 19:38:28.931754 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"812a9fa3-9521-4940-8543-1469cd25e9cb\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-5dd5756b68-g6kf2" podUID="812a9fa3-9521-4940-8543-1469cd25e9cb" Feb 12 19:38:29.349856 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e-shm.mount: Deactivated successfully. Feb 12 19:38:29.350110 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525-shm.mount: Deactivated successfully. Feb 12 19:38:29.350163 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb-shm.mount: Deactivated successfully. Feb 12 19:38:35.435354 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount407972422.mount: Deactivated successfully. Feb 12 19:38:36.117410 env[1376]: time="2024-02-12T19:38:36.117362292Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:36.123297 env[1376]: time="2024-02-12T19:38:36.123265051Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:36.129336 env[1376]: time="2024-02-12T19:38:36.129291244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:36.132741 env[1376]: time="2024-02-12T19:38:36.132706402Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:a45dffb21a0e9ca8962f36359a2ab776beeecd93843543c2fa1745d7bbb0f754,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:36.133316 env[1376]: time="2024-02-12T19:38:36.133286334Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.27.0\" returns image reference \"sha256:c445639cb28807ced09724016dc3b273b170b14d3b3d0c39b1affa1cc6b68774\"" Feb 12 19:38:36.151639 env[1376]: time="2024-02-12T19:38:36.151598183Z" level=info msg="CreateContainer within sandbox \"aae6251314dddd44a6a05d18468cbba62fe75de4f3ac1b09a004eb2fc869d5d4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Feb 12 19:38:36.180744 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2120176526.mount: Deactivated successfully. Feb 12 19:38:36.194688 env[1376]: time="2024-02-12T19:38:36.194629094Z" level=info msg="CreateContainer within sandbox \"aae6251314dddd44a6a05d18468cbba62fe75de4f3ac1b09a004eb2fc869d5d4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0\"" Feb 12 19:38:36.196309 env[1376]: time="2024-02-12T19:38:36.195271904Z" level=info msg="StartContainer for \"e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0\"" Feb 12 19:38:36.212208 systemd[1]: Started cri-containerd-e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0.scope. Feb 12 19:38:36.232000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.238248 kernel: kauditd_printk_skb: 34 callbacks suppressed Feb 12 19:38:36.238329 kernel: audit: type=1400 audit(1707766716.232:1150): avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.232000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2948 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:36.280923 kernel: audit: type=1300 audit(1707766716.232:1150): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=2948 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:36.232000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386231336130663536376132323962393734646633633761626166 Feb 12 19:38:36.304855 kernel: audit: type=1327 audit(1707766716.232:1150): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386231336130663536376132323962393734646633633761626166 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.322447 kernel: audit: type=1400 audit(1707766716.235:1151): avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.340180 kernel: audit: type=1400 audit(1707766716.235:1151): avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.357465 kernel: audit: type=1400 audit(1707766716.235:1151): avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.357659 kernel: audit: type=1400 audit(1707766716.235:1151): avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.375791 env[1376]: time="2024-02-12T19:38:36.375749192Z" level=info msg="StartContainer for \"e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0\" returns successfully" Feb 12 19:38:36.392694 kernel: audit: type=1400 audit(1707766716.235:1151): avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.410763 kernel: audit: type=1400 audit(1707766716.235:1151): avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.410906 kernel: audit: type=1400 audit(1707766716.235:1151): avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.235000 audit: BPF prog-id=146 op=LOAD Feb 12 19:38:36.235000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=2948 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:36.235000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386231336130663536376132323962393734646633633761626166 Feb 12 19:38:36.237000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.237000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.237000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.237000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.237000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.237000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.237000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.237000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.237000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.237000 audit: BPF prog-id=147 op=LOAD Feb 12 19:38:36.237000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=2948 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:36.237000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386231336130663536376132323962393734646633633761626166 Feb 12 19:38:36.254000 audit: BPF prog-id=147 op=UNLOAD Feb 12 19:38:36.254000 audit: BPF prog-id=146 op=UNLOAD Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { perfmon } for pid=3410 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit[3410]: AVC avc: denied { bpf } for pid=3410 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:36.254000 audit: BPF prog-id=148 op=LOAD Feb 12 19:38:36.254000 audit[3410]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=2948 pid=3410 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:36.254000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6535386231336130663536376132323962393734646633633761626166 Feb 12 19:38:36.782922 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Feb 12 19:38:36.783050 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Feb 12 19:38:36.890591 systemd[1]: run-containerd-runc-k8s.io-e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0-runc.p1v6Pj.mount: Deactivated successfully. Feb 12 19:38:36.897970 kubelet[2501]: I0212 19:38:36.897942 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-wxqgc" podStartSLOduration=2.134731297 podCreationTimestamp="2024-02-12 19:38:14 +0000 UTC" firstStartedPulling="2024-02-12 19:38:15.370416121 +0000 UTC m=+22.875345733" lastFinishedPulling="2024-02-12 19:38:36.133558841 +0000 UTC m=+43.638488493" observedRunningTime="2024-02-12 19:38:36.897326763 +0000 UTC m=+44.402256415" watchObservedRunningTime="2024-02-12 19:38:36.897874057 +0000 UTC m=+44.402803669" Feb 12 19:38:38.154000 audit[3577]: AVC avc: denied { write } for pid=3577 comm="tee" name="fd" dev="proc" ino=24955 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:38:38.154000 audit[3577]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff49d5962 a2=241 a3=1b6 items=1 ppid=3526 pid=3577 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:38.154000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Feb 12 19:38:38.154000 audit: PATH item=0 name="/dev/fd/63" inode=24178 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:38:38.154000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:38:38.158000 audit[3572]: AVC avc: denied { write } for pid=3572 comm="tee" name="fd" dev="proc" ino=24185 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:38:38.158000 audit[3572]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe2458971 a2=241 a3=1b6 items=1 ppid=3530 pid=3572 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:38.158000 audit: CWD cwd="/etc/service/enabled/confd/log" Feb 12 19:38:38.158000 audit: PATH item=0 name="/dev/fd/63" inode=24950 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:38:38.158000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:38:38.164000 audit[3567]: AVC avc: denied { write } for pid=3567 comm="tee" name="fd" dev="proc" ino=24965 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:38:38.164000 audit[3567]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffce038971 a2=241 a3=1b6 items=1 ppid=3528 pid=3567 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:38.164000 audit: CWD cwd="/etc/service/enabled/felix/log" Feb 12 19:38:38.164000 audit: PATH item=0 name="/dev/fd/63" inode=24949 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:38:38.164000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:38:38.169000 audit[3565]: AVC avc: denied { write } for pid=3565 comm="tee" name="fd" dev="proc" ino=24196 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:38:38.169000 audit[3565]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffdb5cd961 a2=241 a3=1b6 items=1 ppid=3531 pid=3565 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:38.169000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Feb 12 19:38:38.169000 audit: PATH item=0 name="/dev/fd/63" inode=24948 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:38:38.169000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:38:38.171000 audit[3580]: AVC avc: denied { write } for pid=3580 comm="tee" name="fd" dev="proc" ino=24201 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:38:38.171000 audit[3580]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=ffffe8057971 a2=241 a3=1b6 items=1 ppid=3524 pid=3580 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:38.171000 audit: CWD cwd="/etc/service/enabled/bird6/log" Feb 12 19:38:38.171000 audit: PATH item=0 name="/dev/fd/63" inode=24179 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:38:38.171000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:38:38.191000 audit[3588]: AVC avc: denied { write } for pid=3588 comm="tee" name="fd" dev="proc" ino=24973 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:38:38.191000 audit[3588]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff3611973 a2=241 a3=1b6 items=1 ppid=3535 pid=3588 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:38.191000 audit: CWD cwd="/etc/service/enabled/cni/log" Feb 12 19:38:38.191000 audit: PATH item=0 name="/dev/fd/63" inode=24198 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:38:38.191000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:38:38.195000 audit[3591]: AVC avc: denied { write } for pid=3591 comm="tee" name="fd" dev="proc" ino=24205 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Feb 12 19:38:38.195000 audit[3591]: SYSCALL arch=c00000b7 syscall=56 success=yes exit=3 a0=ffffffffffffff9c a1=fffff0415972 a2=241 a3=1b6 items=1 ppid=3522 pid=3591 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:38.195000 audit: CWD cwd="/etc/service/enabled/bird/log" Feb 12 19:38:38.195000 audit: PATH item=0 name="/dev/fd/63" inode=24967 dev=00:0b mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Feb 12 19:38:38.195000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Feb 12 19:38:39.626955 env[1376]: time="2024-02-12T19:38:39.626912578Z" level=info msg="StopPodSandbox for \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\"" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.680 [INFO][3646] k8s.go 578: Cleaning up netns ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.680 [INFO][3646] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" iface="eth0" netns="/var/run/netns/cni-7c1b1a95-260f-bd46-0571-2879d3d271c7" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.680 [INFO][3646] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" iface="eth0" netns="/var/run/netns/cni-7c1b1a95-260f-bd46-0571-2879d3d271c7" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.681 [INFO][3646] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" iface="eth0" netns="/var/run/netns/cni-7c1b1a95-260f-bd46-0571-2879d3d271c7" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.681 [INFO][3646] k8s.go 585: Releasing IP address(es) ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.681 [INFO][3646] utils.go 188: Calico CNI releasing IP address ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.699 [INFO][3652] ipam_plugin.go 415: Releasing address using handleID ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" HandleID="k8s-pod-network.f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.699 [INFO][3652] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.699 [INFO][3652] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.716 [WARNING][3652] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" HandleID="k8s-pod-network.f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.716 [INFO][3652] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" HandleID="k8s-pod-network.f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.717 [INFO][3652] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:39.719805 env[1376]: 2024-02-12 19:38:39.718 [INFO][3646] k8s.go 591: Teardown processing complete. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:39.722257 systemd[1]: run-netns-cni\x2d7c1b1a95\x2d260f\x2dbd46\x2d0571\x2d2879d3d271c7.mount: Deactivated successfully. Feb 12 19:38:39.723653 env[1376]: time="2024-02-12T19:38:39.723592644Z" level=info msg="TearDown network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\" successfully" Feb 12 19:38:39.723653 env[1376]: time="2024-02-12T19:38:39.723641921Z" level=info msg="StopPodSandbox for \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\" returns successfully" Feb 12 19:38:39.724376 env[1376]: time="2024-02-12T19:38:39.724344929Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-g6kf2,Uid:812a9fa3-9521-4940-8543-1469cd25e9cb,Namespace:kube-system,Attempt:1,}" Feb 12 19:38:39.902773 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali38cb0d0a0ad: link becomes ready Feb 12 19:38:39.905059 systemd-networkd[1523]: cali38cb0d0a0ad: Link UP Feb 12 19:38:39.906277 systemd-networkd[1523]: cali38cb0d0a0ad: Gained carrier Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.789 [INFO][3660] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.803 [INFO][3660] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0 coredns-5dd5756b68- kube-system 812a9fa3-9521-4940-8543-1469cd25e9cb 708 0 2024-02-12 19:38:08 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-04a5975e1d coredns-5dd5756b68-g6kf2 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali38cb0d0a0ad [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Namespace="kube-system" Pod="coredns-5dd5756b68-g6kf2" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.803 [INFO][3660] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Namespace="kube-system" Pod="coredns-5dd5756b68-g6kf2" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.827 [INFO][3671] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" HandleID="k8s-pod-network.0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.838 [INFO][3671] ipam_plugin.go 268: Auto assigning IP ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" HandleID="k8s-pod-network.0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b27c0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-04a5975e1d", "pod":"coredns-5dd5756b68-g6kf2", "timestamp":"2024-02-12 19:38:39.827191033 +0000 UTC"}, Hostname:"ci-3510.3.2-a-04a5975e1d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.838 [INFO][3671] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.838 [INFO][3671] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.838 [INFO][3671] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-04a5975e1d' Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.840 [INFO][3671] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.843 [INFO][3671] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.846 [INFO][3671] ipam.go 489: Trying affinity for 192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.848 [INFO][3671] ipam.go 155: Attempting to load block cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.850 [INFO][3671] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.850 [INFO][3671] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.92.0/26 handle="k8s-pod-network.0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.851 [INFO][3671] ipam.go 1682: Creating new handle: k8s-pod-network.0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.855 [INFO][3671] ipam.go 1203: Writing block in order to claim IPs block=192.168.92.0/26 handle="k8s-pod-network.0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.858 [INFO][3671] ipam.go 1216: Successfully claimed IPs: [192.168.92.1/26] block=192.168.92.0/26 handle="k8s-pod-network.0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.858 [INFO][3671] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.92.1/26] handle="k8s-pod-network.0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.858 [INFO][3671] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:39.918581 env[1376]: 2024-02-12 19:38:39.858 [INFO][3671] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.92.1/26] IPv6=[] ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" HandleID="k8s-pod-network.0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.919202 env[1376]: 2024-02-12 19:38:39.860 [INFO][3660] k8s.go 385: Populated endpoint ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Namespace="kube-system" Pod="coredns-5dd5756b68-g6kf2" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"812a9fa3-9521-4940-8543-1469cd25e9cb", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"", Pod:"coredns-5dd5756b68-g6kf2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.92.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali38cb0d0a0ad", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:39.919202 env[1376]: 2024-02-12 19:38:39.861 [INFO][3660] k8s.go 386: Calico CNI using IPs: [192.168.92.1/32] ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Namespace="kube-system" Pod="coredns-5dd5756b68-g6kf2" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.919202 env[1376]: 2024-02-12 19:38:39.861 [INFO][3660] dataplane_linux.go 68: Setting the host side veth name to cali38cb0d0a0ad ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Namespace="kube-system" Pod="coredns-5dd5756b68-g6kf2" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.919202 env[1376]: 2024-02-12 19:38:39.906 [INFO][3660] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Namespace="kube-system" Pod="coredns-5dd5756b68-g6kf2" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.919202 env[1376]: 2024-02-12 19:38:39.906 [INFO][3660] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Namespace="kube-system" Pod="coredns-5dd5756b68-g6kf2" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"812a9fa3-9521-4940-8543-1469cd25e9cb", ResourceVersion:"708", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e", Pod:"coredns-5dd5756b68-g6kf2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.92.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali38cb0d0a0ad", MAC:"0a:c7:48:e3:53:89", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:39.919202 env[1376]: 2024-02-12 19:38:39.917 [INFO][3660] k8s.go 491: Wrote updated endpoint to datastore ContainerID="0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e" Namespace="kube-system" Pod="coredns-5dd5756b68-g6kf2" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:39.937809 env[1376]: time="2024-02-12T19:38:39.937725345Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:38:39.937949 env[1376]: time="2024-02-12T19:38:39.937814861Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:38:39.937949 env[1376]: time="2024-02-12T19:38:39.937841180Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:38:39.938038 env[1376]: time="2024-02-12T19:38:39.937978854Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e pid=3699 runtime=io.containerd.runc.v2 Feb 12 19:38:39.957184 systemd[1]: Started cri-containerd-0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e.scope. Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.969000 audit: BPF prog-id=149 op=LOAD Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3699 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:39.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643261613864653930656237646164636162353139336638363634 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3699 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:39.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643261613864653930656237646164636162353139336638363634 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit: BPF prog-id=150 op=LOAD Feb 12 19:38:39.970000 audit[3708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3699 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:39.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643261613864653930656237646164636162353139336638363634 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit: BPF prog-id=151 op=LOAD Feb 12 19:38:39.970000 audit[3708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3699 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:39.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643261613864653930656237646164636162353139336638363634 Feb 12 19:38:39.970000 audit: BPF prog-id=151 op=UNLOAD Feb 12 19:38:39.970000 audit: BPF prog-id=150 op=UNLOAD Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { perfmon } for pid=3708 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit[3708]: AVC avc: denied { bpf } for pid=3708 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:39.970000 audit: BPF prog-id=152 op=LOAD Feb 12 19:38:39.970000 audit[3708]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3699 pid=3708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:39.970000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061643261613864653930656237646164636162353139336638363634 Feb 12 19:38:39.991016 env[1376]: time="2024-02-12T19:38:39.990969554Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-g6kf2,Uid:812a9fa3-9521-4940-8543-1469cd25e9cb,Namespace:kube-system,Attempt:1,} returns sandbox id \"0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e\"" Feb 12 19:38:39.995258 env[1376]: time="2024-02-12T19:38:39.994993770Z" level=info msg="CreateContainer within sandbox \"0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:38:40.047062 env[1376]: time="2024-02-12T19:38:40.047013823Z" level=info msg="CreateContainer within sandbox \"0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"0e468ebd63abc8c7c0dba53bef0d00d824163c01ecaf6c34bbd7e0684938b02b\"" Feb 12 19:38:40.049436 env[1376]: time="2024-02-12T19:38:40.048756744Z" level=info msg="StartContainer for \"0e468ebd63abc8c7c0dba53bef0d00d824163c01ecaf6c34bbd7e0684938b02b\"" Feb 12 19:38:40.063194 systemd[1]: Started cri-containerd-0e468ebd63abc8c7c0dba53bef0d00d824163c01ecaf6c34bbd7e0684938b02b.scope. Feb 12 19:38:40.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.078000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.078000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit: BPF prog-id=153 op=LOAD Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343638656264363361626338633763306462613533626566306430 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343638656264363361626338633763306462613533626566306430 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit: BPF prog-id=154 op=LOAD Feb 12 19:38:40.079000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343638656264363361626338633763306462613533626566306430 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit: BPF prog-id=155 op=LOAD Feb 12 19:38:40.079000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343638656264363361626338633763306462613533626566306430 Feb 12 19:38:40.079000 audit: BPF prog-id=155 op=UNLOAD Feb 12 19:38:40.079000 audit: BPF prog-id=154 op=UNLOAD Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { perfmon } for pid=3741 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit[3741]: AVC avc: denied { bpf } for pid=3741 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.079000 audit: BPF prog-id=156 op=LOAD Feb 12 19:38:40.079000 audit[3741]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3699 pid=3741 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.079000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3065343638656264363361626338633763306462613533626566306430 Feb 12 19:38:40.097639 env[1376]: time="2024-02-12T19:38:40.097579825Z" level=info msg="StartContainer for \"0e468ebd63abc8c7c0dba53bef0d00d824163c01ecaf6c34bbd7e0684938b02b\" returns successfully" Feb 12 19:38:40.626677 env[1376]: time="2024-02-12T19:38:40.626612668Z" level=info msg="StopPodSandbox for \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\"" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.666 [INFO][3809] k8s.go 578: Cleaning up netns ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.667 [INFO][3809] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" iface="eth0" netns="/var/run/netns/cni-fad12ba6-c978-59a1-68b6-95c9039a5f68" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.667 [INFO][3809] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" iface="eth0" netns="/var/run/netns/cni-fad12ba6-c978-59a1-68b6-95c9039a5f68" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.668 [INFO][3809] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" iface="eth0" netns="/var/run/netns/cni-fad12ba6-c978-59a1-68b6-95c9039a5f68" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.668 [INFO][3809] k8s.go 585: Releasing IP address(es) ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.668 [INFO][3809] utils.go 188: Calico CNI releasing IP address ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.685 [INFO][3815] ipam_plugin.go 415: Releasing address using handleID ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" HandleID="k8s-pod-network.b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.686 [INFO][3815] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.686 [INFO][3815] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.695 [WARNING][3815] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" HandleID="k8s-pod-network.b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.695 [INFO][3815] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" HandleID="k8s-pod-network.b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.696 [INFO][3815] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:40.698926 env[1376]: 2024-02-12 19:38:40.697 [INFO][3809] k8s.go 591: Teardown processing complete. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:40.699545 env[1376]: time="2024-02-12T19:38:40.699087442Z" level=info msg="TearDown network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\" successfully" Feb 12 19:38:40.699545 env[1376]: time="2024-02-12T19:38:40.699120401Z" level=info msg="StopPodSandbox for \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\" returns successfully" Feb 12 19:38:40.700345 env[1376]: time="2024-02-12T19:38:40.700307027Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c4bd6f65f-fl9fb,Uid:fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa,Namespace:calico-system,Attempt:1,}" Feb 12 19:38:40.723080 systemd[1]: run-netns-cni\x2dfad12ba6\x2dc978\x2d59a1\x2d68b6\x2d95c9039a5f68.mount: Deactivated successfully. Feb 12 19:38:40.862697 systemd-networkd[1523]: calid2d5ce9f435: Link UP Feb 12 19:38:40.871819 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid2d5ce9f435: link becomes ready Feb 12 19:38:40.872076 systemd-networkd[1523]: calid2d5ce9f435: Gained carrier Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.776 [INFO][3821] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.789 [INFO][3821] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0 calico-kube-controllers-5c4bd6f65f- calico-system fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa 717 0 2024-02-12 19:38:15 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:5c4bd6f65f projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.2-a-04a5975e1d calico-kube-controllers-5c4bd6f65f-fl9fb eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calid2d5ce9f435 [] []}} ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Namespace="calico-system" Pod="calico-kube-controllers-5c4bd6f65f-fl9fb" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.789 [INFO][3821] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Namespace="calico-system" Pod="calico-kube-controllers-5c4bd6f65f-fl9fb" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.814 [INFO][3833] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" HandleID="k8s-pod-network.5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.825 [INFO][3833] ipam_plugin.go 268: Auto assigning IP ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" HandleID="k8s-pod-network.5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000317230), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-04a5975e1d", "pod":"calico-kube-controllers-5c4bd6f65f-fl9fb", "timestamp":"2024-02-12 19:38:40.81455488 +0000 UTC"}, Hostname:"ci-3510.3.2-a-04a5975e1d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.825 [INFO][3833] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.825 [INFO][3833] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.825 [INFO][3833] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-04a5975e1d' Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.827 [INFO][3833] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.830 [INFO][3833] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.833 [INFO][3833] ipam.go 489: Trying affinity for 192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.835 [INFO][3833] ipam.go 155: Attempting to load block cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.837 [INFO][3833] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.837 [INFO][3833] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.92.0/26 handle="k8s-pod-network.5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.841 [INFO][3833] ipam.go 1682: Creating new handle: k8s-pod-network.5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2 Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.845 [INFO][3833] ipam.go 1203: Writing block in order to claim IPs block=192.168.92.0/26 handle="k8s-pod-network.5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.857 [INFO][3833] ipam.go 1216: Successfully claimed IPs: [192.168.92.2/26] block=192.168.92.0/26 handle="k8s-pod-network.5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.857 [INFO][3833] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.92.2/26] handle="k8s-pod-network.5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.857 [INFO][3833] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:40.886030 env[1376]: 2024-02-12 19:38:40.857 [INFO][3833] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.92.2/26] IPv6=[] ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" HandleID="k8s-pod-network.5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.887024 env[1376]: 2024-02-12 19:38:40.859 [INFO][3821] k8s.go 385: Populated endpoint ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Namespace="calico-system" Pod="calico-kube-controllers-5c4bd6f65f-fl9fb" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0", GenerateName:"calico-kube-controllers-5c4bd6f65f-", Namespace:"calico-system", SelfLink:"", UID:"fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c4bd6f65f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"", Pod:"calico-kube-controllers-5c4bd6f65f-fl9fb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.92.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid2d5ce9f435", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:40.887024 env[1376]: 2024-02-12 19:38:40.859 [INFO][3821] k8s.go 386: Calico CNI using IPs: [192.168.92.2/32] ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Namespace="calico-system" Pod="calico-kube-controllers-5c4bd6f65f-fl9fb" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.887024 env[1376]: 2024-02-12 19:38:40.859 [INFO][3821] dataplane_linux.go 68: Setting the host side veth name to calid2d5ce9f435 ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Namespace="calico-system" Pod="calico-kube-controllers-5c4bd6f65f-fl9fb" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.887024 env[1376]: 2024-02-12 19:38:40.872 [INFO][3821] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Namespace="calico-system" Pod="calico-kube-controllers-5c4bd6f65f-fl9fb" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.887024 env[1376]: 2024-02-12 19:38:40.873 [INFO][3821] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Namespace="calico-system" Pod="calico-kube-controllers-5c4bd6f65f-fl9fb" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0", GenerateName:"calico-kube-controllers-5c4bd6f65f-", Namespace:"calico-system", SelfLink:"", UID:"fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa", ResourceVersion:"717", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c4bd6f65f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2", Pod:"calico-kube-controllers-5c4bd6f65f-fl9fb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.92.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid2d5ce9f435", MAC:"5a:dd:2d:f7:5f:e9", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:40.887024 env[1376]: 2024-02-12 19:38:40.880 [INFO][3821] k8s.go 491: Wrote updated endpoint to datastore ContainerID="5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2" Namespace="calico-system" Pod="calico-kube-controllers-5c4bd6f65f-fl9fb" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:40.913101 kubelet[2501]: I0212 19:38:40.912689 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-g6kf2" podStartSLOduration=32.912625981 podCreationTimestamp="2024-02-12 19:38:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:38:40.895693104 +0000 UTC m=+48.400622796" watchObservedRunningTime="2024-02-12 19:38:40.912625981 +0000 UTC m=+48.417555633" Feb 12 19:38:40.918334 env[1376]: time="2024-02-12T19:38:40.917188095Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:38:40.918334 env[1376]: time="2024-02-12T19:38:40.917236493Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:38:40.918334 env[1376]: time="2024-02-12T19:38:40.917247332Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:38:40.918537 env[1376]: time="2024-02-12T19:38:40.918452918Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2 pid=3860 runtime=io.containerd.runc.v2 Feb 12 19:38:40.917000 audit[3855]: NETFILTER_CFG table=filter:98 family=2 entries=16 op=nft_register_rule pid=3855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:40.917000 audit[3855]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5660 a0=3 a1=fffff9cf6600 a2=0 a3=ffffaaaa66c0 items=0 ppid=2675 pid=3855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.917000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:40.924000 audit[3855]: NETFILTER_CFG table=nat:99 family=2 entries=12 op=nft_register_rule pid=3855 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:40.924000 audit[3855]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2572 a0=3 a1=fffff9cf6600 a2=0 a3=ffffaaaa66c0 items=0 ppid=2675 pid=3855 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.924000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:40.942482 systemd[1]: Started cri-containerd-5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2.scope. Feb 12 19:38:40.947000 audit[3881]: NETFILTER_CFG table=filter:100 family=2 entries=13 op=nft_register_rule pid=3881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:40.947000 audit[3881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffd1a0add0 a2=0 a3=ffff9c40f6c0 items=0 ppid=2675 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.947000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:40.949000 audit[3881]: NETFILTER_CFG table=nat:101 family=2 entries=33 op=nft_register_chain pid=3881 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:40.949000 audit[3881]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13060 a0=3 a1=ffffd1a0add0 a2=0 a3=ffff9c40f6c0 items=0 ppid=2675 pid=3881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.949000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.965000 audit: BPF prog-id=157 op=LOAD Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564343537323364333338613966326631623435643137623361376561 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564343537323364333338613966326631623435643137623361376561 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit: BPF prog-id=158 op=LOAD Feb 12 19:38:40.966000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564343537323364333338613966326631623435643137623361376561 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit: BPF prog-id=159 op=LOAD Feb 12 19:38:40.966000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564343537323364333338613966326631623435643137623361376561 Feb 12 19:38:40.966000 audit: BPF prog-id=159 op=UNLOAD Feb 12 19:38:40.966000 audit: BPF prog-id=158 op=UNLOAD Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { perfmon } for pid=3869 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit[3869]: AVC avc: denied { bpf } for pid=3869 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:40.966000 audit: BPF prog-id=160 op=LOAD Feb 12 19:38:40.966000 audit[3869]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3860 pid=3869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:40.966000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3564343537323364333338613966326631623435643137623361376561 Feb 12 19:38:40.986654 env[1376]: time="2024-02-12T19:38:40.985593053Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-5c4bd6f65f-fl9fb,Uid:fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa,Namespace:calico-system,Attempt:1,} returns sandbox id \"5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2\"" Feb 12 19:38:40.990283 env[1376]: time="2024-02-12T19:38:40.990246883Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\"" Feb 12 19:38:41.084053 systemd-networkd[1523]: cali38cb0d0a0ad: Gained IPv6LL Feb 12 19:38:41.626530 env[1376]: time="2024-02-12T19:38:41.626491824Z" level=info msg="StopPodSandbox for \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\"" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.668 [INFO][3931] k8s.go 578: Cleaning up netns ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.668 [INFO][3931] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" iface="eth0" netns="/var/run/netns/cni-a0d21584-2464-9a53-cd55-e73dcffab6ba" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.669 [INFO][3931] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" iface="eth0" netns="/var/run/netns/cni-a0d21584-2464-9a53-cd55-e73dcffab6ba" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.669 [INFO][3931] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" iface="eth0" netns="/var/run/netns/cni-a0d21584-2464-9a53-cd55-e73dcffab6ba" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.669 [INFO][3931] k8s.go 585: Releasing IP address(es) ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.669 [INFO][3931] utils.go 188: Calico CNI releasing IP address ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.685 [INFO][3937] ipam_plugin.go 415: Releasing address using handleID ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" HandleID="k8s-pod-network.a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.685 [INFO][3937] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.685 [INFO][3937] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.694 [WARNING][3937] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" HandleID="k8s-pod-network.a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.694 [INFO][3937] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" HandleID="k8s-pod-network.a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.695 [INFO][3937] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:41.698121 env[1376]: 2024-02-12 19:38:41.697 [INFO][3931] k8s.go 591: Teardown processing complete. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:41.698892 env[1376]: time="2024-02-12T19:38:41.698848286Z" level=info msg="TearDown network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\" successfully" Feb 12 19:38:41.698991 env[1376]: time="2024-02-12T19:38:41.698974160Z" level=info msg="StopPodSandbox for \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\" returns successfully" Feb 12 19:38:41.699955 env[1376]: time="2024-02-12T19:38:41.699929678Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xw4f7,Uid:bd44a0a2-f8ab-4667-96c5-b482c6e09bd7,Namespace:kube-system,Attempt:1,}" Feb 12 19:38:41.722414 systemd[1]: run-containerd-runc-k8s.io-5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2-runc.OxfmG3.mount: Deactivated successfully. Feb 12 19:38:41.722530 systemd[1]: run-netns-cni\x2da0d21584\x2d2464\x2d9a53\x2dcd55\x2de73dcffab6ba.mount: Deactivated successfully. Feb 12 19:38:41.981775 systemd-networkd[1523]: calid2d5ce9f435: Gained IPv6LL Feb 12 19:38:42.109362 systemd-networkd[1523]: calia6643882efa: Link UP Feb 12 19:38:42.122082 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:38:42.122186 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia6643882efa: link becomes ready Feb 12 19:38:42.123334 systemd-networkd[1523]: calia6643882efa: Gained carrier Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.030 [INFO][3943] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.044 [INFO][3943] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0 coredns-5dd5756b68- kube-system bd44a0a2-f8ab-4667-96c5-b482c6e09bd7 735 0 2024-02-12 19:38:08 +0000 UTC map[k8s-app:kube-dns pod-template-hash:5dd5756b68 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.2-a-04a5975e1d coredns-5dd5756b68-xw4f7 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calia6643882efa [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Namespace="kube-system" Pod="coredns-5dd5756b68-xw4f7" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.044 [INFO][3943] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Namespace="kube-system" Pod="coredns-5dd5756b68-xw4f7" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.072 [INFO][3955] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" HandleID="k8s-pod-network.2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.083 [INFO][3955] ipam_plugin.go 268: Auto assigning IP ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" HandleID="k8s-pod-network.2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x400025fcb0), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.2-a-04a5975e1d", "pod":"coredns-5dd5756b68-xw4f7", "timestamp":"2024-02-12 19:38:42.072071369 +0000 UTC"}, Hostname:"ci-3510.3.2-a-04a5975e1d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.083 [INFO][3955] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.083 [INFO][3955] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.083 [INFO][3955] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-04a5975e1d' Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.084 [INFO][3955] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.087 [INFO][3955] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.090 [INFO][3955] ipam.go 489: Trying affinity for 192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.092 [INFO][3955] ipam.go 155: Attempting to load block cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.094 [INFO][3955] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.094 [INFO][3955] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.92.0/26 handle="k8s-pod-network.2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.095 [INFO][3955] ipam.go 1682: Creating new handle: k8s-pod-network.2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.099 [INFO][3955] ipam.go 1203: Writing block in order to claim IPs block=192.168.92.0/26 handle="k8s-pod-network.2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.104 [INFO][3955] ipam.go 1216: Successfully claimed IPs: [192.168.92.3/26] block=192.168.92.0/26 handle="k8s-pod-network.2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.104 [INFO][3955] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.92.3/26] handle="k8s-pod-network.2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.104 [INFO][3955] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:42.133977 env[1376]: 2024-02-12 19:38:42.104 [INFO][3955] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.92.3/26] IPv6=[] ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" HandleID="k8s-pod-network.2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:42.134573 env[1376]: 2024-02-12 19:38:42.106 [INFO][3943] k8s.go 385: Populated endpoint ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Namespace="kube-system" Pod="coredns-5dd5756b68-xw4f7" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"bd44a0a2-f8ab-4667-96c5-b482c6e09bd7", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"", Pod:"coredns-5dd5756b68-xw4f7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.92.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia6643882efa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:42.134573 env[1376]: 2024-02-12 19:38:42.106 [INFO][3943] k8s.go 386: Calico CNI using IPs: [192.168.92.3/32] ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Namespace="kube-system" Pod="coredns-5dd5756b68-xw4f7" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:42.134573 env[1376]: 2024-02-12 19:38:42.106 [INFO][3943] dataplane_linux.go 68: Setting the host side veth name to calia6643882efa ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Namespace="kube-system" Pod="coredns-5dd5756b68-xw4f7" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:42.134573 env[1376]: 2024-02-12 19:38:42.123 [INFO][3943] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Namespace="kube-system" Pod="coredns-5dd5756b68-xw4f7" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:42.134573 env[1376]: 2024-02-12 19:38:42.124 [INFO][3943] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Namespace="kube-system" Pod="coredns-5dd5756b68-xw4f7" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"bd44a0a2-f8ab-4667-96c5-b482c6e09bd7", ResourceVersion:"735", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b", Pod:"coredns-5dd5756b68-xw4f7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.92.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia6643882efa", MAC:"1e:08:54:26:87:ba", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:42.134573 env[1376]: 2024-02-12 19:38:42.132 [INFO][3943] k8s.go 491: Wrote updated endpoint to datastore ContainerID="2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b" Namespace="kube-system" Pod="coredns-5dd5756b68-xw4f7" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:42.150344 env[1376]: time="2024-02-12T19:38:42.150271176Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:38:42.150473 env[1376]: time="2024-02-12T19:38:42.150359293Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:38:42.150473 env[1376]: time="2024-02-12T19:38:42.150389091Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:38:42.150704 env[1376]: time="2024-02-12T19:38:42.150632001Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b pid=3980 runtime=io.containerd.runc.v2 Feb 12 19:38:42.164766 systemd[1]: Started cri-containerd-2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b.scope. Feb 12 19:38:42.193091 kernel: kauditd_printk_skb: 251 callbacks suppressed Feb 12 19:38:42.193229 kernel: audit: type=1400 audit(1707766722.186:1221): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210844 kernel: audit: type=1400 audit(1707766722.186:1222): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.248737 kernel: audit: type=1400 audit(1707766722.186:1223): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.293034 kernel: audit: type=1400 audit(1707766722.186:1224): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.293140 kernel: audit: type=1400 audit(1707766722.186:1225): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.310546 kernel: audit: type=1400 audit(1707766722.186:1226): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.310655 kernel: audit: type=1400 audit(1707766722.186:1227): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.186000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.345843 kernel: audit: type=1400 audit(1707766722.186:1228): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.186000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.364188 kernel: audit: type=1400 audit(1707766722.186:1229): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.381724 kernel: audit: type=1400 audit(1707766722.191:1230): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.382139 env[1376]: time="2024-02-12T19:38:42.382100959Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-5dd5756b68-xw4f7,Uid:bd44a0a2-f8ab-4667-96c5-b482c6e09bd7,Namespace:kube-system,Attempt:1,} returns sandbox id \"2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b\"" Feb 12 19:38:42.191000 audit: BPF prog-id=161 op=LOAD Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333634666435313165343137373939656131316532353336316364 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333634666435313165343137373939656131316532353336316364 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.191000 audit: BPF prog-id=162 op=LOAD Feb 12 19:38:42.191000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.191000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333634666435313165343137373939656131316532353336316364 Feb 12 19:38:42.210000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.210000 audit: BPF prog-id=163 op=LOAD Feb 12 19:38:42.210000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.210000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333634666435313165343137373939656131316532353336316364 Feb 12 19:38:42.229000 audit: BPF prog-id=163 op=UNLOAD Feb 12 19:38:42.229000 audit: BPF prog-id=162 op=UNLOAD Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { perfmon } for pid=3990 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit[3990]: AVC avc: denied { bpf } for pid=3990 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.230000 audit: BPF prog-id=164 op=LOAD Feb 12 19:38:42.230000 audit[3990]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3980 pid=3990 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.230000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3261333634666435313165343137373939656131316532353336316364 Feb 12 19:38:42.393784 env[1376]: time="2024-02-12T19:38:42.393740648Z" level=info msg="CreateContainer within sandbox \"2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Feb 12 19:38:42.455898 env[1376]: time="2024-02-12T19:38:42.455842562Z" level=info msg="CreateContainer within sandbox \"2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"f2a7471cba1b1d21edfdbcdc710607120dd2c5175cfc20d8e9b553317f68a19e\"" Feb 12 19:38:42.456865 env[1376]: time="2024-02-12T19:38:42.456826279Z" level=info msg="StartContainer for \"f2a7471cba1b1d21edfdbcdc710607120dd2c5175cfc20d8e9b553317f68a19e\"" Feb 12 19:38:42.476204 systemd[1]: Started cri-containerd-f2a7471cba1b1d21edfdbcdc710607120dd2c5175cfc20d8e9b553317f68a19e.scope. Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.493000 audit: BPF prog-id=165 op=LOAD Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=3980 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613734373163626131623164323165646664626364633731303630 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=3980 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613734373163626131623164323165646664626364633731303630 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.494000 audit: BPF prog-id=166 op=LOAD Feb 12 19:38:42.494000 audit[4034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=3980 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.494000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613734373163626131623164323165646664626364633731303630 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit: BPF prog-id=167 op=LOAD Feb 12 19:38:42.495000 audit[4034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=3980 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613734373163626131623164323165646664626364633731303630 Feb 12 19:38:42.495000 audit: BPF prog-id=167 op=UNLOAD Feb 12 19:38:42.495000 audit: BPF prog-id=166 op=UNLOAD Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { perfmon } for pid=4034 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit[4034]: AVC avc: denied { bpf } for pid=4034 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:42.495000 audit: BPF prog-id=168 op=LOAD Feb 12 19:38:42.495000 audit[4034]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=3980 pid=4034 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.495000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6632613734373163626131623164323165646664626364633731303630 Feb 12 19:38:42.514600 env[1376]: time="2024-02-12T19:38:42.514471788Z" level=info msg="StartContainer for \"f2a7471cba1b1d21edfdbcdc710607120dd2c5175cfc20d8e9b553317f68a19e\" returns successfully" Feb 12 19:38:42.723351 systemd[1]: run-containerd-runc-k8s.io-2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b-runc.j70JRD.mount: Deactivated successfully. Feb 12 19:38:42.904082 kubelet[2501]: I0212 19:38:42.903871 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-5dd5756b68-xw4f7" podStartSLOduration=34.903836535 podCreationTimestamp="2024-02-12 19:38:08 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-02-12 19:38:42.903545427 +0000 UTC m=+50.408475079" watchObservedRunningTime="2024-02-12 19:38:42.903836535 +0000 UTC m=+50.408766147" Feb 12 19:38:42.934000 audit[4071]: NETFILTER_CFG table=filter:102 family=2 entries=10 op=nft_register_rule pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:42.934000 audit[4071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffffdf50740 a2=0 a3=ffffab27b6c0 items=0 ppid=2675 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.934000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:42.993000 audit[4071]: NETFILTER_CFG table=nat:103 family=2 entries=42 op=nft_register_rule pid=4071 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:42.993000 audit[4071]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=13060 a0=3 a1=fffffdf50740 a2=0 a3=ffffab27b6c0 items=0 ppid=2675 pid=4071 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:42.993000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:43.000000 audit[4074]: NETFILTER_CFG table=filter:104 family=2 entries=10 op=nft_register_rule pid=4074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:43.000000 audit[4074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=fffff952f500 a2=0 a3=ffffbc93d6c0 items=0 ppid=2675 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:43.000000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:43.013000 audit[4074]: NETFILTER_CFG table=nat:105 family=2 entries=54 op=nft_register_chain pid=4074 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:43.013000 audit[4074]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=18724 a0=3 a1=fffff952f500 a2=0 a3=ffffbc93d6c0 items=0 ppid=2675 pid=4074 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:43.013000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:43.165515 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2978864075.mount: Deactivated successfully. Feb 12 19:38:43.323877 systemd-networkd[1523]: calia6643882efa: Gained IPv6LL Feb 12 19:38:43.625989 env[1376]: time="2024-02-12T19:38:43.625931459Z" level=info msg="StopPodSandbox for \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\"" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.670 [INFO][4111] k8s.go 578: Cleaning up netns ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.670 [INFO][4111] dataplane_linux.go 530: Deleting workload's device in netns. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" iface="eth0" netns="/var/run/netns/cni-386c21a6-538f-2d88-9c0b-061b05916067" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.670 [INFO][4111] dataplane_linux.go 541: Entered netns, deleting veth. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" iface="eth0" netns="/var/run/netns/cni-386c21a6-538f-2d88-9c0b-061b05916067" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.670 [INFO][4111] dataplane_linux.go 568: Workload's veth was already gone. Nothing to do. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" iface="eth0" netns="/var/run/netns/cni-386c21a6-538f-2d88-9c0b-061b05916067" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.670 [INFO][4111] k8s.go 585: Releasing IP address(es) ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.670 [INFO][4111] utils.go 188: Calico CNI releasing IP address ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.689 [INFO][4117] ipam_plugin.go 415: Releasing address using handleID ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" HandleID="k8s-pod-network.e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.690 [INFO][4117] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.690 [INFO][4117] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.699 [WARNING][4117] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" HandleID="k8s-pod-network.e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.699 [INFO][4117] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" HandleID="k8s-pod-network.e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.701 [INFO][4117] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:43.705012 env[1376]: 2024-02-12 19:38:43.703 [INFO][4111] k8s.go 591: Teardown processing complete. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:43.708280 env[1376]: time="2024-02-12T19:38:43.707475605Z" level=info msg="TearDown network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\" successfully" Feb 12 19:38:43.708280 env[1376]: time="2024-02-12T19:38:43.707515163Z" level=info msg="StopPodSandbox for \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\" returns successfully" Feb 12 19:38:43.707141 systemd[1]: run-netns-cni\x2d386c21a6\x2d538f\x2d2d88\x2d9c0b\x2d061b05916067.mount: Deactivated successfully. Feb 12 19:38:43.708535 env[1376]: time="2024-02-12T19:38:43.708496360Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zl24r,Uid:eef99c0d-631c-483b-800d-d16dee0a8718,Namespace:calico-system,Attempt:1,}" Feb 12 19:38:43.846823 systemd-networkd[1523]: calid9097d8e539: Link UP Feb 12 19:38:43.865250 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:38:43.865494 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calid9097d8e539: link becomes ready Feb 12 19:38:43.865688 systemd-networkd[1523]: calid9097d8e539: Gained carrier Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.763 [INFO][4123] utils.go 100: File /var/lib/calico/mtu does not exist Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.777 [INFO][4123] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0 csi-node-driver- calico-system eef99c0d-631c-483b-800d-d16dee0a8718 755 0 2024-02-12 19:38:15 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:676488fcc9 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:default] map[] [] [] []} {k8s ci-3510.3.2-a-04a5975e1d csi-node-driver-zl24r eth0 default [] [] [kns.calico-system ksa.calico-system.default] calid9097d8e539 [] []}} ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Namespace="calico-system" Pod="csi-node-driver-zl24r" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.777 [INFO][4123] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Namespace="calico-system" Pod="csi-node-driver-zl24r" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.803 [INFO][4135] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" HandleID="k8s-pod-network.ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.816 [INFO][4135] ipam_plugin.go 268: Auto assigning IP ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" HandleID="k8s-pod-network.ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40002b58d0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.2-a-04a5975e1d", "pod":"csi-node-driver-zl24r", "timestamp":"2024-02-12 19:38:43.803157937 +0000 UTC"}, Hostname:"ci-3510.3.2-a-04a5975e1d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.816 [INFO][4135] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.817 [INFO][4135] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.817 [INFO][4135] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-04a5975e1d' Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.818 [INFO][4135] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.821 [INFO][4135] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.824 [INFO][4135] ipam.go 489: Trying affinity for 192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.826 [INFO][4135] ipam.go 155: Attempting to load block cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.830 [INFO][4135] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.830 [INFO][4135] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.92.0/26 handle="k8s-pod-network.ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.831 [INFO][4135] ipam.go 1682: Creating new handle: k8s-pod-network.ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.835 [INFO][4135] ipam.go 1203: Writing block in order to claim IPs block=192.168.92.0/26 handle="k8s-pod-network.ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.842 [INFO][4135] ipam.go 1216: Successfully claimed IPs: [192.168.92.4/26] block=192.168.92.0/26 handle="k8s-pod-network.ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.842 [INFO][4135] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.92.4/26] handle="k8s-pod-network.ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.842 [INFO][4135] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:43.877435 env[1376]: 2024-02-12 19:38:43.842 [INFO][4135] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.92.4/26] IPv6=[] ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" HandleID="k8s-pod-network.ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.878566 env[1376]: 2024-02-12 19:38:43.844 [INFO][4123] k8s.go 385: Populated endpoint ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Namespace="calico-system" Pod="csi-node-driver-zl24r" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eef99c0d-631c-483b-800d-d16dee0a8718", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"", Pod:"csi-node-driver-zl24r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid9097d8e539", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:43.878566 env[1376]: 2024-02-12 19:38:43.844 [INFO][4123] k8s.go 386: Calico CNI using IPs: [192.168.92.4/32] ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Namespace="calico-system" Pod="csi-node-driver-zl24r" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.878566 env[1376]: 2024-02-12 19:38:43.844 [INFO][4123] dataplane_linux.go 68: Setting the host side veth name to calid9097d8e539 ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Namespace="calico-system" Pod="csi-node-driver-zl24r" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.878566 env[1376]: 2024-02-12 19:38:43.866 [INFO][4123] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Namespace="calico-system" Pod="csi-node-driver-zl24r" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.878566 env[1376]: 2024-02-12 19:38:43.866 [INFO][4123] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Namespace="calico-system" Pod="csi-node-driver-zl24r" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eef99c0d-631c-483b-800d-d16dee0a8718", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec", Pod:"csi-node-driver-zl24r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid9097d8e539", MAC:"52:63:16:82:68:63", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:43.878566 env[1376]: 2024-02-12 19:38:43.875 [INFO][4123] k8s.go 491: Wrote updated endpoint to datastore ContainerID="ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec" Namespace="calico-system" Pod="csi-node-driver-zl24r" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:43.896700 env[1376]: time="2024-02-12T19:38:43.896622405Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:38:43.896852 env[1376]: time="2024-02-12T19:38:43.896828476Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:38:43.896935 env[1376]: time="2024-02-12T19:38:43.896914873Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:38:43.897322 env[1376]: time="2024-02-12T19:38:43.897278257Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec pid=4158 runtime=io.containerd.runc.v2 Feb 12 19:38:43.918995 systemd[1]: Started cri-containerd-ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec.scope. Feb 12 19:38:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.933000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.933000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit: BPF prog-id=169 op=LOAD Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4158 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383037333263656466626432626361653932386466623338373665 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4158 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383037333263656466626432626361653932386466623338373665 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit: BPF prog-id=170 op=LOAD Feb 12 19:38:43.934000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4158 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383037333263656466626432626361653932386466623338373665 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit: BPF prog-id=171 op=LOAD Feb 12 19:38:43.934000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4158 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383037333263656466626432626361653932386466623338373665 Feb 12 19:38:43.934000 audit: BPF prog-id=171 op=UNLOAD Feb 12 19:38:43.934000 audit: BPF prog-id=170 op=UNLOAD Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { perfmon } for pid=4167 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit[4167]: AVC avc: denied { bpf } for pid=4167 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:43.934000 audit: BPF prog-id=172 op=LOAD Feb 12 19:38:43.934000 audit[4167]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4158 pid=4167 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:43.934000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6165383037333263656466626432626361653932386466623338373665 Feb 12 19:38:43.946409 env[1376]: time="2024-02-12T19:38:43.946351490Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-zl24r,Uid:eef99c0d-631c-483b-800d-d16dee0a8718,Namespace:calico-system,Attempt:1,} returns sandbox id \"ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec\"" Feb 12 19:38:44.736358 systemd[1]: run-containerd-runc-k8s.io-ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec-runc.YuAa1J.mount: Deactivated successfully. Feb 12 19:38:44.797365 env[1376]: time="2024-02-12T19:38:44.797318267Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:44.807753 env[1376]: time="2024-02-12T19:38:44.807716022Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:44.812123 env[1376]: time="2024-02-12T19:38:44.812088794Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:44.818519 env[1376]: time="2024-02-12T19:38:44.818490480Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:e264ab1fb2f1ae90dd1d84e226d11d2eb4350e74ac27de4c65f29f5aadba5bb1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:44.819134 env[1376]: time="2024-02-12T19:38:44.819105654Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.27.0\" returns image reference \"sha256:094645649618376e48b5ec13a94a164d53dbdf819b7ab644f080b751f24560c8\"" Feb 12 19:38:44.821540 env[1376]: time="2024-02-12T19:38:44.820105611Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\"" Feb 12 19:38:44.834763 env[1376]: time="2024-02-12T19:38:44.834727985Z" level=info msg="CreateContainer within sandbox \"5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Feb 12 19:38:44.867244 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2621704388.mount: Deactivated successfully. Feb 12 19:38:44.893840 env[1376]: time="2024-02-12T19:38:44.893788256Z" level=info msg="CreateContainer within sandbox \"5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa\"" Feb 12 19:38:44.896163 env[1376]: time="2024-02-12T19:38:44.895938204Z" level=info msg="StartContainer for \"45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa\"" Feb 12 19:38:44.913865 systemd[1]: Started cri-containerd-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa.scope. Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.928000 audit: BPF prog-id=173 op=LOAD Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=3860 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:44.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435373333363138653362633635616365366438373063633932363738 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=3860 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:44.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435373333363138653362633635616365366438373063633932363738 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit: BPF prog-id=174 op=LOAD Feb 12 19:38:44.929000 audit[4223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=3860 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:44.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435373333363138653362633635616365366438373063633932363738 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit: BPF prog-id=175 op=LOAD Feb 12 19:38:44.929000 audit[4223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=3860 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:44.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435373333363138653362633635616365366438373063633932363738 Feb 12 19:38:44.929000 audit: BPF prog-id=175 op=UNLOAD Feb 12 19:38:44.929000 audit: BPF prog-id=174 op=UNLOAD Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { perfmon } for pid=4223 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit[4223]: AVC avc: denied { bpf } for pid=4223 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:44.929000 audit: BPF prog-id=176 op=LOAD Feb 12 19:38:44.929000 audit[4223]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=3860 pid=4223 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:44.929000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3435373333363138653362633635616365366438373063633932363738 Feb 12 19:38:44.954004 env[1376]: time="2024-02-12T19:38:44.953946281Z" level=info msg="StartContainer for \"45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa\" returns successfully" Feb 12 19:38:45.097098 kubelet[2501]: I0212 19:38:45.096992 2501 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Feb 12 19:38:45.131000 audit[4256]: NETFILTER_CFG table=filter:106 family=2 entries=9 op=nft_register_rule pid=4256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:45.131000 audit[4256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffcd6ac7a0 a2=0 a3=ffffb4b966c0 items=0 ppid=2675 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:45.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:45.136000 audit[4256]: NETFILTER_CFG table=nat:107 family=2 entries=25 op=nft_register_chain pid=4256 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:38:45.136000 audit[4256]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8252 a0=3 a1=ffffcd6ac7a0 a2=0 a3=ffffb4b966c0 items=0 ppid=2675 pid=4256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:45.136000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:38:45.179827 systemd-networkd[1523]: calid9097d8e539: Gained IPv6LL Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit: BPF prog-id=177 op=LOAD Feb 12 19:38:45.874000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff4d2daf8 a2=70 a3=0 items=0 ppid=4278 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:45.874000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:38:45.874000 audit: BPF prog-id=177 op=UNLOAD Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit: BPF prog-id=178 op=LOAD Feb 12 19:38:45.874000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=5 a1=fffff4d2daf8 a2=70 a3=4a174c items=0 ppid=4278 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:45.874000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:38:45.874000 audit: BPF prog-id=178 op=UNLOAD Feb 12 19:38:45.874000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.874000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=3 a0=0 a1=fffff4d2db28 a2=70 a3=9ada79f items=0 ppid=4278 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:45.874000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { perfmon } for pid=4331 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit[4331]: AVC avc: denied { bpf } for pid=4331 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.875000 audit: BPF prog-id=179 op=LOAD Feb 12 19:38:45.875000 audit[4331]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=5 a0=5 a1=fffff4d2da78 a2=70 a3=9ada7b9 items=0 ppid=4278 pid=4331 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:45.875000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Feb 12 19:38:45.909000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.909000 audit[4339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe130bfa8 a2=70 a3=0 items=0 ppid=4278 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:45.909000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:38:45.909000 audit[4339]: AVC avc: denied { bpf } for pid=4339 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:45.909000 audit[4339]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=ffffe130be88 a2=70 a3=2 items=0 ppid=4278 pid=4339 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:45.909000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Feb 12 19:38:45.915000 audit: BPF prog-id=179 op=UNLOAD Feb 12 19:38:45.938868 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.TPcht9.mount: Deactivated successfully. Feb 12 19:38:45.987958 kubelet[2501]: I0212 19:38:45.987920 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-5c4bd6f65f-fl9fb" podStartSLOduration=27.156446589 podCreationTimestamp="2024-02-12 19:38:15 +0000 UTC" firstStartedPulling="2024-02-12 19:38:40.98810086 +0000 UTC m=+48.493030512" lastFinishedPulling="2024-02-12 19:38:44.819533596 +0000 UTC m=+52.324463248" observedRunningTime="2024-02-12 19:38:45.929485794 +0000 UTC m=+53.434415406" watchObservedRunningTime="2024-02-12 19:38:45.987879325 +0000 UTC m=+53.492808977" Feb 12 19:38:46.137000 audit[4391]: NETFILTER_CFG table=mangle:108 family=2 entries=19 op=nft_register_chain pid=4391 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:38:46.137000 audit[4391]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6800 a0=3 a1=ffffd0576120 a2=0 a3=ffffa35d9fa8 items=0 ppid=4278 pid=4391 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:46.137000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:38:46.150000 audit[4386]: NETFILTER_CFG table=nat:109 family=2 entries=16 op=nft_register_chain pid=4386 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:38:46.150000 audit[4386]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5188 a0=3 a1=ffffd1917960 a2=0 a3=ffff948f7fa8 items=0 ppid=4278 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:46.150000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:38:46.151000 audit[4385]: NETFILTER_CFG table=filter:110 family=2 entries=157 op=nft_register_chain pid=4385 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:38:46.151000 audit[4385]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=86820 a0=3 a1=ffffead8c650 a2=0 a3=ffff81892fa8 items=0 ppid=4278 pid=4385 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:46.151000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:38:46.161000 audit[4384]: NETFILTER_CFG table=raw:111 family=2 entries=19 op=nft_register_chain pid=4384 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:38:46.161000 audit[4384]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6132 a0=3 a1=ffffcadde0d0 a2=0 a3=ffff9cd75fa8 items=0 ppid=4278 pid=4384 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:46.161000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:38:46.631122 systemd-networkd[1523]: vxlan.calico: Link UP Feb 12 19:38:46.631134 systemd-networkd[1523]: vxlan.calico: Gained carrier Feb 12 19:38:46.669039 env[1376]: time="2024-02-12T19:38:46.668997491Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:46.676922 env[1376]: time="2024-02-12T19:38:46.676893161Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:46.685948 env[1376]: time="2024-02-12T19:38:46.685918783Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:46.690500 env[1376]: time="2024-02-12T19:38:46.690476473Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:2b9021393c17e87ba8a3c89f5b3719941812f4e4751caa0b71eb2233bff48738,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:46.691159 env[1376]: time="2024-02-12T19:38:46.691132805Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.27.0\" returns image reference \"sha256:4b71e7439e0eba34a97844591560a009f37e8e6c17a386a34d416c1cc872dee8\"" Feb 12 19:38:46.693709 env[1376]: time="2024-02-12T19:38:46.693642141Z" level=info msg="CreateContainer within sandbox \"ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Feb 12 19:38:46.741899 env[1376]: time="2024-02-12T19:38:46.741834606Z" level=info msg="CreateContainer within sandbox \"ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f1101d9e37baa54dfc76d65672b67a8fb7deeac4230206ed5e6d7310f1f25906\"" Feb 12 19:38:46.742564 env[1376]: time="2024-02-12T19:38:46.742519258Z" level=info msg="StartContainer for \"f1101d9e37baa54dfc76d65672b67a8fb7deeac4230206ed5e6d7310f1f25906\"" Feb 12 19:38:46.778489 systemd[1]: Started cri-containerd-f1101d9e37baa54dfc76d65672b67a8fb7deeac4230206ed5e6d7310f1f25906.scope. Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001475a0 a2=3c a3=0 items=0 ppid=4158 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:46.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313031643965333762616135346466633736643635363732623637 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit: BPF prog-id=180 op=LOAD Feb 12 19:38:46.823000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001478e0 a2=78 a3=0 items=0 ppid=4158 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:46.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313031643965333762616135346466633736643635363732623637 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit: BPF prog-id=181 op=LOAD Feb 12 19:38:46.823000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000147670 a2=78 a3=0 items=0 ppid=4158 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:46.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313031643965333762616135346466633736643635363732623637 Feb 12 19:38:46.823000 audit: BPF prog-id=181 op=UNLOAD Feb 12 19:38:46.823000 audit: BPF prog-id=180 op=UNLOAD Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { perfmon } for pid=4407 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit[4407]: AVC avc: denied { bpf } for pid=4407 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:46.823000 audit: BPF prog-id=182 op=LOAD Feb 12 19:38:46.823000 audit[4407]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000147b40 a2=78 a3=0 items=0 ppid=4158 pid=4407 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:46.823000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6631313031643965333762616135346466633736643635363732623637 Feb 12 19:38:47.108598 env[1376]: time="2024-02-12T19:38:47.108543812Z" level=info msg="StartContainer for \"f1101d9e37baa54dfc76d65672b67a8fb7deeac4230206ed5e6d7310f1f25906\" returns successfully" Feb 12 19:38:47.111870 env[1376]: time="2024-02-12T19:38:47.111702561Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\"" Feb 12 19:38:47.995815 systemd-networkd[1523]: vxlan.calico: Gained IPv6LL Feb 12 19:38:49.057462 env[1376]: time="2024-02-12T19:38:49.057418268Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:49.065953 env[1376]: time="2024-02-12T19:38:49.065909205Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:49.069924 env[1376]: time="2024-02-12T19:38:49.069891684Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:49.074921 env[1376]: time="2024-02-12T19:38:49.074890323Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:45a7aba6020a7cf7b866cb8a8d481b30c97e9b3407e1459aaa65a5b4cc06633a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:38:49.075402 env[1376]: time="2024-02-12T19:38:49.075370463Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.27.0\" returns image reference \"sha256:9dbda087e98c46610fb8629cf530f1fe49eee4b17d2afe455664ca446ec39d43\"" Feb 12 19:38:49.078982 env[1376]: time="2024-02-12T19:38:49.078940959Z" level=info msg="CreateContainer within sandbox \"ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Feb 12 19:38:49.106199 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3831677572.mount: Deactivated successfully. Feb 12 19:38:49.125979 env[1376]: time="2024-02-12T19:38:49.125934301Z" level=info msg="CreateContainer within sandbox \"ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"c353a0778d715ddc94783ecc7dc78312c7fee8039ddac4b7a8f1f263b39459dc\"" Feb 12 19:38:49.126974 env[1376]: time="2024-02-12T19:38:49.126946860Z" level=info msg="StartContainer for \"c353a0778d715ddc94783ecc7dc78312c7fee8039ddac4b7a8f1f263b39459dc\"" Feb 12 19:38:49.154273 systemd[1]: Started cri-containerd-c353a0778d715ddc94783ecc7dc78312c7fee8039ddac4b7a8f1f263b39459dc.scope. Feb 12 19:38:49.159479 systemd[1]: run-containerd-runc-k8s.io-c353a0778d715ddc94783ecc7dc78312c7fee8039ddac4b7a8f1f263b39459dc-runc.wZ5viM.mount: Deactivated successfully. Feb 12 19:38:49.213796 kernel: kauditd_printk_skb: 340 callbacks suppressed Feb 12 19:38:49.213925 kernel: audit: type=1400 audit(1707766729.190:1318): avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4158 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:49.243690 kernel: audit: type=1300 audit(1707766729.190:1318): arch=c00000b7 syscall=280 success=yes exit=15 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4158 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:49.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353361303737386437313564646339343738336563633764633738 Feb 12 19:38:49.276692 kernel: audit: type=1327 audit(1707766729.190:1318): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353361303737386437313564646339343738336563633764633738 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.296798 kernel: audit: type=1400 audit(1707766729.190:1319): avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.332547 kernel: audit: type=1400 audit(1707766729.190:1319): avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.332629 kernel: audit: type=1400 audit(1707766729.190:1319): avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.352046 kernel: audit: type=1400 audit(1707766729.190:1319): avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.352566 env[1376]: time="2024-02-12T19:38:49.352529791Z" level=info msg="StartContainer for \"c353a0778d715ddc94783ecc7dc78312c7fee8039ddac4b7a8f1f263b39459dc\" returns successfully" Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.370236 kernel: audit: type=1400 audit(1707766729.190:1319): avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.387883 kernel: audit: type=1400 audit(1707766729.190:1319): avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.405831 kernel: audit: type=1400 audit(1707766729.190:1319): avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.190000 audit: BPF prog-id=183 op=LOAD Feb 12 19:38:49.190000 audit[4442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4158 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:49.190000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353361303737386437313564646339343738336563633764633738 Feb 12 19:38:49.195000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.195000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.195000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.195000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.195000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.195000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.195000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.195000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.213000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:49.213000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400ca17f50 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:38:49.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:38:49.213000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:49.213000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4007c64ee0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:38:49.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:38:49.213000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:49.213000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400cbf2090 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:38:49.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:38:49.213000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:49.213000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400cbf20c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:38:49.213000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:38:49.195000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.195000 audit: BPF prog-id=184 op=LOAD Feb 12 19:38:49.195000 audit[4442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=17 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4158 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:49.195000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353361303737386437313564646339343738336563633764633738 Feb 12 19:38:49.214000 audit: BPF prog-id=184 op=UNLOAD Feb 12 19:38:49.214000 audit: BPF prog-id=183 op=UNLOAD Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { perfmon } for pid=4442 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit[4442]: AVC avc: denied { bpf } for pid=4442 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:38:49.214000 audit: BPF prog-id=185 op=LOAD Feb 12 19:38:49.214000 audit[4442]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=15 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4158 pid=4442 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:38:49.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333353361303737386437313564646339343738336563633764633738 Feb 12 19:38:49.276000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:49.276000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=4007154420 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:38:49.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:38:49.276000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:49.276000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=69 a1=400cbf34d0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:38:49.276000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:38:49.817301 kubelet[2501]: I0212 19:38:49.817261 2501 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Feb 12 19:38:49.817301 kubelet[2501]: I0212 19:38:49.817308 2501 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Feb 12 19:38:50.130793 kubelet[2501]: I0212 19:38:50.130699 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-zl24r" podStartSLOduration=30.002556091 podCreationTimestamp="2024-02-12 19:38:15 +0000 UTC" firstStartedPulling="2024-02-12 19:38:43.947521239 +0000 UTC m=+51.452450891" lastFinishedPulling="2024-02-12 19:38:49.075611573 +0000 UTC m=+56.580541225" observedRunningTime="2024-02-12 19:38:50.129385076 +0000 UTC m=+57.634314728" watchObservedRunningTime="2024-02-12 19:38:50.130646425 +0000 UTC m=+57.635576037" Feb 12 19:38:50.369000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:50.369000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:50.369000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017bf0e0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:38:50.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:38:50.369000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001f4ce40 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:38:50.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:38:52.676700 env[1376]: time="2024-02-12T19:38:52.676463659Z" level=info msg="StopPodSandbox for \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\"" Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.715 [WARNING][4497] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"bd44a0a2-f8ab-4667-96c5-b482c6e09bd7", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b", Pod:"coredns-5dd5756b68-xw4f7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.92.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia6643882efa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.715 [INFO][4497] k8s.go 578: Cleaning up netns ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.716 [INFO][4497] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" iface="eth0" netns="" Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.716 [INFO][4497] k8s.go 585: Releasing IP address(es) ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.716 [INFO][4497] utils.go 188: Calico CNI releasing IP address ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.731 [INFO][4505] ipam_plugin.go 415: Releasing address using handleID ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" HandleID="k8s-pod-network.a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.732 [INFO][4505] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.732 [INFO][4505] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.741 [WARNING][4505] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" HandleID="k8s-pod-network.a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.741 [INFO][4505] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" HandleID="k8s-pod-network.a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.742 [INFO][4505] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:52.745201 env[1376]: 2024-02-12 19:38:52.743 [INFO][4497] k8s.go 591: Teardown processing complete. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:52.745746 env[1376]: time="2024-02-12T19:38:52.745711591Z" level=info msg="TearDown network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\" successfully" Feb 12 19:38:52.745813 env[1376]: time="2024-02-12T19:38:52.745797908Z" level=info msg="StopPodSandbox for \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\" returns successfully" Feb 12 19:38:52.746641 env[1376]: time="2024-02-12T19:38:52.746611436Z" level=info msg="RemovePodSandbox for \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\"" Feb 12 19:38:52.746739 env[1376]: time="2024-02-12T19:38:52.746653674Z" level=info msg="Forcibly stopping sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\"" Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.801 [WARNING][4525] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"bd44a0a2-f8ab-4667-96c5-b482c6e09bd7", ResourceVersion:"746", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"2a364fd511e417799ea11e25361cd89b71a16148cd53ffb359e3b0ad8c93131b", Pod:"coredns-5dd5756b68-xw4f7", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.92.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calia6643882efa", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.801 [INFO][4525] k8s.go 578: Cleaning up netns ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.801 [INFO][4525] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" iface="eth0" netns="" Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.801 [INFO][4525] k8s.go 585: Releasing IP address(es) ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.801 [INFO][4525] utils.go 188: Calico CNI releasing IP address ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.819 [INFO][4532] ipam_plugin.go 415: Releasing address using handleID ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" HandleID="k8s-pod-network.a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.820 [INFO][4532] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.820 [INFO][4532] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.829 [WARNING][4532] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" HandleID="k8s-pod-network.a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.829 [INFO][4532] ipam_plugin.go 443: Releasing address using workloadID ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" HandleID="k8s-pod-network.a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--xw4f7-eth0" Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.831 [INFO][4532] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:52.833713 env[1376]: 2024-02-12 19:38:52.832 [INFO][4525] k8s.go 591: Teardown processing complete. ContainerID="a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525" Feb 12 19:38:52.834238 env[1376]: time="2024-02-12T19:38:52.833747869Z" level=info msg="TearDown network for sandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\" successfully" Feb 12 19:38:52.857786 env[1376]: time="2024-02-12T19:38:52.857733971Z" level=info msg="RemovePodSandbox \"a2cd159213e32a3f48abcbd5e6a8abad2a9d489d257608e4a02100ea64745525\" returns successfully" Feb 12 19:38:52.858318 env[1376]: time="2024-02-12T19:38:52.858282830Z" level=info msg="StopPodSandbox for \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\"" Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.920 [WARNING][4551] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"812a9fa3-9521-4940-8543-1469cd25e9cb", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e", Pod:"coredns-5dd5756b68-g6kf2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.92.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali38cb0d0a0ad", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.921 [INFO][4551] k8s.go 578: Cleaning up netns ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.921 [INFO][4551] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" iface="eth0" netns="" Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.921 [INFO][4551] k8s.go 585: Releasing IP address(es) ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.921 [INFO][4551] utils.go 188: Calico CNI releasing IP address ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.939 [INFO][4559] ipam_plugin.go 415: Releasing address using handleID ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" HandleID="k8s-pod-network.f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.939 [INFO][4559] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.939 [INFO][4559] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.948 [WARNING][4559] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" HandleID="k8s-pod-network.f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.948 [INFO][4559] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" HandleID="k8s-pod-network.f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.949 [INFO][4559] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:52.952439 env[1376]: 2024-02-12 19:38:52.951 [INFO][4551] k8s.go 591: Teardown processing complete. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:52.952924 env[1376]: time="2024-02-12T19:38:52.952475187Z" level=info msg="TearDown network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\" successfully" Feb 12 19:38:52.952924 env[1376]: time="2024-02-12T19:38:52.952505066Z" level=info msg="StopPodSandbox for \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\" returns successfully" Feb 12 19:38:52.953338 env[1376]: time="2024-02-12T19:38:52.953308074Z" level=info msg="RemovePodSandbox for \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\"" Feb 12 19:38:52.953463 env[1376]: time="2024-02-12T19:38:52.953343473Z" level=info msg="Forcibly stopping sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\"" Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:52.986 [WARNING][4578] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0", GenerateName:"coredns-5dd5756b68-", Namespace:"kube-system", SelfLink:"", UID:"812a9fa3-9521-4940-8543-1469cd25e9cb", ResourceVersion:"726", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"5dd5756b68", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"0ad2aa8de90eb7dadcab5193f8664d99882ac05cffec0f03b481ea1894556a1e", Pod:"coredns-5dd5756b68-g6kf2", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.92.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali38cb0d0a0ad", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:52.986 [INFO][4578] k8s.go 578: Cleaning up netns ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:52.986 [INFO][4578] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" iface="eth0" netns="" Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:52.986 [INFO][4578] k8s.go 585: Releasing IP address(es) ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:52.986 [INFO][4578] utils.go 188: Calico CNI releasing IP address ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:53.005 [INFO][4585] ipam_plugin.go 415: Releasing address using handleID ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" HandleID="k8s-pod-network.f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:53.005 [INFO][4585] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:53.005 [INFO][4585] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:53.014 [WARNING][4585] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" HandleID="k8s-pod-network.f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:53.014 [INFO][4585] ipam_plugin.go 443: Releasing address using workloadID ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" HandleID="k8s-pod-network.f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Workload="ci--3510.3.2--a--04a5975e1d-k8s-coredns--5dd5756b68--g6kf2-eth0" Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:53.015 [INFO][4585] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:53.018572 env[1376]: 2024-02-12 19:38:53.017 [INFO][4578] k8s.go 591: Teardown processing complete. ContainerID="f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e" Feb 12 19:38:53.019014 env[1376]: time="2024-02-12T19:38:53.018607168Z" level=info msg="TearDown network for sandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\" successfully" Feb 12 19:38:53.030537 env[1376]: time="2024-02-12T19:38:53.030492588Z" level=info msg="RemovePodSandbox \"f0a4420c3afb9990bf7be5d185aacb32fba730b631280b38ab254b57e704699e\" returns successfully" Feb 12 19:38:53.031031 env[1376]: time="2024-02-12T19:38:53.031002048Z" level=info msg="StopPodSandbox for \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\"" Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.062 [WARNING][4604] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eef99c0d-631c-483b-800d-d16dee0a8718", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec", Pod:"csi-node-driver-zl24r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid9097d8e539", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.062 [INFO][4604] k8s.go 578: Cleaning up netns ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.062 [INFO][4604] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" iface="eth0" netns="" Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.062 [INFO][4604] k8s.go 585: Releasing IP address(es) ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.062 [INFO][4604] utils.go 188: Calico CNI releasing IP address ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.082 [INFO][4611] ipam_plugin.go 415: Releasing address using handleID ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" HandleID="k8s-pod-network.e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.082 [INFO][4611] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.082 [INFO][4611] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.091 [WARNING][4611] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" HandleID="k8s-pod-network.e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.091 [INFO][4611] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" HandleID="k8s-pod-network.e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.092 [INFO][4611] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:53.095056 env[1376]: 2024-02-12 19:38:53.094 [INFO][4604] k8s.go 591: Teardown processing complete. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:53.095503 env[1376]: time="2024-02-12T19:38:53.095083209Z" level=info msg="TearDown network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\" successfully" Feb 12 19:38:53.095503 env[1376]: time="2024-02-12T19:38:53.095113207Z" level=info msg="StopPodSandbox for \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\" returns successfully" Feb 12 19:38:53.095934 env[1376]: time="2024-02-12T19:38:53.095906057Z" level=info msg="RemovePodSandbox for \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\"" Feb 12 19:38:53.096008 env[1376]: time="2024-02-12T19:38:53.095940735Z" level=info msg="Forcibly stopping sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\"" Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.131 [WARNING][4631] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"eef99c0d-631c-483b-800d-d16dee0a8718", ResourceVersion:"802", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"676488fcc9", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"default"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"ae80732cedfbd2bcae928dfb3876e87ac2a3aaa3621c6a3c5a63e29a43c1cfec", Pod:"csi-node-driver-zl24r", Endpoint:"eth0", ServiceAccountName:"default", IPNetworks:[]string{"192.168.92.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.default"}, InterfaceName:"calid9097d8e539", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.131 [INFO][4631] k8s.go 578: Cleaning up netns ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.131 [INFO][4631] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" iface="eth0" netns="" Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.131 [INFO][4631] k8s.go 585: Releasing IP address(es) ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.131 [INFO][4631] utils.go 188: Calico CNI releasing IP address ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.152 [INFO][4637] ipam_plugin.go 415: Releasing address using handleID ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" HandleID="k8s-pod-network.e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.152 [INFO][4637] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.152 [INFO][4637] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.161 [WARNING][4637] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" HandleID="k8s-pod-network.e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.161 [INFO][4637] ipam_plugin.go 443: Releasing address using workloadID ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" HandleID="k8s-pod-network.e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Workload="ci--3510.3.2--a--04a5975e1d-k8s-csi--node--driver--zl24r-eth0" Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.163 [INFO][4637] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:53.165600 env[1376]: 2024-02-12 19:38:53.164 [INFO][4631] k8s.go 591: Teardown processing complete. ContainerID="e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4" Feb 12 19:38:53.166057 env[1376]: time="2024-02-12T19:38:53.165628999Z" level=info msg="TearDown network for sandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\" successfully" Feb 12 19:38:53.175887 env[1376]: time="2024-02-12T19:38:53.175828124Z" level=info msg="RemovePodSandbox \"e7b9d4d6149d7402c7d8de78c0a08c8341fab91b30605450f4f425edcf358cb4\" returns successfully" Feb 12 19:38:53.176429 env[1376]: time="2024-02-12T19:38:53.176395822Z" level=info msg="StopPodSandbox for \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\"" Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.207 [WARNING][4657] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0", GenerateName:"calico-kube-controllers-5c4bd6f65f-", Namespace:"calico-system", SelfLink:"", UID:"fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c4bd6f65f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2", Pod:"calico-kube-controllers-5c4bd6f65f-fl9fb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.92.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid2d5ce9f435", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.207 [INFO][4657] k8s.go 578: Cleaning up netns ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.207 [INFO][4657] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" iface="eth0" netns="" Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.207 [INFO][4657] k8s.go 585: Releasing IP address(es) ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.207 [INFO][4657] utils.go 188: Calico CNI releasing IP address ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.224 [INFO][4663] ipam_plugin.go 415: Releasing address using handleID ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" HandleID="k8s-pod-network.b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.225 [INFO][4663] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.225 [INFO][4663] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.233 [WARNING][4663] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" HandleID="k8s-pod-network.b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.233 [INFO][4663] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" HandleID="k8s-pod-network.b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.235 [INFO][4663] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:53.238646 env[1376]: 2024-02-12 19:38:53.236 [INFO][4657] k8s.go 591: Teardown processing complete. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:53.239463 env[1376]: time="2024-02-12T19:38:53.238791727Z" level=info msg="TearDown network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\" successfully" Feb 12 19:38:53.239463 env[1376]: time="2024-02-12T19:38:53.238842885Z" level=info msg="StopPodSandbox for \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\" returns successfully" Feb 12 19:38:53.239757 env[1376]: time="2024-02-12T19:38:53.239736091Z" level=info msg="RemovePodSandbox for \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\"" Feb 12 19:38:53.239885 env[1376]: time="2024-02-12T19:38:53.239847207Z" level=info msg="Forcibly stopping sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\"" Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.272 [WARNING][4681] k8s.go 542: CNI_CONTAINERID does not match WorkloadEndpoint ConainerID, don't delete WEP. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0", GenerateName:"calico-kube-controllers-5c4bd6f65f-", Namespace:"calico-system", SelfLink:"", UID:"fdf8bb27-2031-4a7b-b806-5f3c2a5baeaa", ResourceVersion:"780", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 38, 15, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"5c4bd6f65f", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"5d45723d338a9f2f1b45d17b3a7ea5f7e82710d110b0cba2cb05bdb26017cca2", Pod:"calico-kube-controllers-5c4bd6f65f-fl9fb", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.92.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calid2d5ce9f435", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.272 [INFO][4681] k8s.go 578: Cleaning up netns ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.272 [INFO][4681] dataplane_linux.go 526: CleanUpNamespace called with no netns name, ignoring. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" iface="eth0" netns="" Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.272 [INFO][4681] k8s.go 585: Releasing IP address(es) ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.272 [INFO][4681] utils.go 188: Calico CNI releasing IP address ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.289 [INFO][4687] ipam_plugin.go 415: Releasing address using handleID ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" HandleID="k8s-pod-network.b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.289 [INFO][4687] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.289 [INFO][4687] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.297 [WARNING][4687] ipam_plugin.go 432: Asked to release address but it doesn't exist. Ignoring ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" HandleID="k8s-pod-network.b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.298 [INFO][4687] ipam_plugin.go 443: Releasing address using workloadID ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" HandleID="k8s-pod-network.b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--kube--controllers--5c4bd6f65f--fl9fb-eth0" Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.299 [INFO][4687] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:38:53.301875 env[1376]: 2024-02-12 19:38:53.300 [INFO][4681] k8s.go 591: Teardown processing complete. ContainerID="b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb" Feb 12 19:38:53.302383 env[1376]: time="2024-02-12T19:38:53.301901085Z" level=info msg="TearDown network for sandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\" successfully" Feb 12 19:38:53.311382 env[1376]: time="2024-02-12T19:38:53.311339960Z" level=info msg="RemovePodSandbox \"b1a25e9d01a3fa9a86e41784fc23ef75f9debdb541ac0dfb069aa28d27dfb3cb\" returns successfully" Feb 12 19:38:57.693000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:57.699196 kernel: kauditd_printk_skb: 57 callbacks suppressed Feb 12 19:38:57.699310 kernel: audit: type=1400 audit(1707766737.693:1333): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:57.693000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:57.741866 kernel: audit: type=1400 audit(1707766737.693:1332): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:57.693000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017bf880 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:38:57.770231 kernel: audit: type=1300 audit(1707766737.693:1332): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017bf880 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:38:57.693000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:38:57.793715 kernel: audit: type=1327 audit(1707766737.693:1332): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:38:57.693000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:57.814979 kernel: audit: type=1400 audit(1707766737.693:1334): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:57.815083 kernel: audit: type=1300 audit(1707766737.693:1334): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017bf9a0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:38:57.693000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017bf9a0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:38:57.693000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:38:57.866508 kernel: audit: type=1327 audit(1707766737.693:1334): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:38:57.693000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:57.882873 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.gYdIHr.mount: Deactivated successfully. Feb 12 19:38:57.891777 kernel: audit: type=1400 audit(1707766737.693:1335): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:38:57.891899 kernel: audit: type=1300 audit(1707766737.693:1335): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017bfbc0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:38:57.693000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40017bfbc0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:38:57.693000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:38:57.944176 kernel: audit: type=1327 audit(1707766737.693:1335): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:38:57.693000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40024bc460 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:38:57.693000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:39:04.646334 systemd[1]: run-containerd-runc-k8s.io-e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0-runc.ggdHut.mount: Deactivated successfully. Feb 12 19:39:08.810278 kubelet[2501]: I0212 19:39:08.810230 2501 topology_manager.go:215] "Topology Admit Handler" podUID="ef435f59-9293-415a-a148-cc273dac3869" podNamespace="calico-apiserver" podName="calico-apiserver-77746f7c67-c2jrl" Feb 12 19:39:08.815542 systemd[1]: Created slice kubepods-besteffort-podef435f59_9293_415a_a148_cc273dac3869.slice. Feb 12 19:39:08.828340 kubelet[2501]: I0212 19:39:08.828299 2501 topology_manager.go:215] "Topology Admit Handler" podUID="72807fb9-51c9-4fcc-944c-8a4600956601" podNamespace="calico-apiserver" podName="calico-apiserver-77746f7c67-9cxxs" Feb 12 19:39:08.832614 systemd[1]: Created slice kubepods-besteffort-pod72807fb9_51c9_4fcc_944c_8a4600956601.slice. Feb 12 19:39:08.870000 audit[4753]: NETFILTER_CFG table=filter:112 family=2 entries=8 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:08.875999 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:39:08.876099 kernel: audit: type=1325 audit(1707766748.870:1336): table=filter:112 family=2 entries=8 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:08.870000 audit[4753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc947ae90 a2=0 a3=ffffa5ef86c0 items=0 ppid=2675 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:08.918212 kernel: audit: type=1300 audit(1707766748.870:1336): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffc947ae90 a2=0 a3=ffffa5ef86c0 items=0 ppid=2675 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:08.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:08.926481 kubelet[2501]: I0212 19:39:08.926454 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-x8f27\" (UniqueName: \"kubernetes.io/projected/72807fb9-51c9-4fcc-944c-8a4600956601-kube-api-access-x8f27\") pod \"calico-apiserver-77746f7c67-9cxxs\" (UID: \"72807fb9-51c9-4fcc-944c-8a4600956601\") " pod="calico-apiserver/calico-apiserver-77746f7c67-9cxxs" Feb 12 19:39:08.926707 kubelet[2501]: I0212 19:39:08.926695 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/ef435f59-9293-415a-a148-cc273dac3869-calico-apiserver-certs\") pod \"calico-apiserver-77746f7c67-c2jrl\" (UID: \"ef435f59-9293-415a-a148-cc273dac3869\") " pod="calico-apiserver/calico-apiserver-77746f7c67-c2jrl" Feb 12 19:39:08.926856 kubelet[2501]: I0212 19:39:08.926846 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/72807fb9-51c9-4fcc-944c-8a4600956601-calico-apiserver-certs\") pod \"calico-apiserver-77746f7c67-9cxxs\" (UID: \"72807fb9-51c9-4fcc-944c-8a4600956601\") " pod="calico-apiserver/calico-apiserver-77746f7c67-9cxxs" Feb 12 19:39:08.926986 kubelet[2501]: I0212 19:39:08.926976 2501 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-thfvq\" (UniqueName: \"kubernetes.io/projected/ef435f59-9293-415a-a148-cc273dac3869-kube-api-access-thfvq\") pod \"calico-apiserver-77746f7c67-c2jrl\" (UID: \"ef435f59-9293-415a-a148-cc273dac3869\") " pod="calico-apiserver/calico-apiserver-77746f7c67-c2jrl" Feb 12 19:39:08.933283 kernel: audit: type=1327 audit(1707766748.870:1336): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:08.871000 audit[4753]: NETFILTER_CFG table=nat:113 family=2 entries=20 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:08.947321 kernel: audit: type=1325 audit(1707766748.871:1337): table=nat:113 family=2 entries=20 op=nft_register_rule pid=4753 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:08.871000 audit[4753]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc947ae90 a2=0 a3=ffffa5ef86c0 items=0 ppid=2675 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:08.975513 kernel: audit: type=1300 audit(1707766748.871:1337): arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc947ae90 a2=0 a3=ffffa5ef86c0 items=0 ppid=2675 pid=4753 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:08.871000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:08.989195 kernel: audit: type=1327 audit(1707766748.871:1337): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:08.948000 audit[4755]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:09.003284 kernel: audit: type=1325 audit(1707766748.948:1338): table=filter:114 family=2 entries=9 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:08.948000 audit[4755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc4112ff0 a2=0 a3=ffffbd4926c0 items=0 ppid=2675 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:09.028657 kubelet[2501]: E0212 19:39:09.028628 2501 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:39:09.028911 kubelet[2501]: E0212 19:39:09.028896 2501 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/ef435f59-9293-415a-a148-cc273dac3869-calico-apiserver-certs podName:ef435f59-9293-415a-a148-cc273dac3869 nodeName:}" failed. No retries permitted until 2024-02-12 19:39:09.528863863 +0000 UTC m=+77.033793515 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/ef435f59-9293-415a-a148-cc273dac3869-calico-apiserver-certs") pod "calico-apiserver-77746f7c67-c2jrl" (UID: "ef435f59-9293-415a-a148-cc273dac3869") : secret "calico-apiserver-certs" not found Feb 12 19:39:09.029276 kubelet[2501]: E0212 19:39:09.029261 2501 secret.go:194] Couldn't get secret calico-apiserver/calico-apiserver-certs: secret "calico-apiserver-certs" not found Feb 12 19:39:09.029441 kubelet[2501]: E0212 19:39:09.029428 2501 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/secret/72807fb9-51c9-4fcc-944c-8a4600956601-calico-apiserver-certs podName:72807fb9-51c9-4fcc-944c-8a4600956601 nodeName:}" failed. No retries permitted until 2024-02-12 19:39:09.529413165 +0000 UTC m=+77.034342817 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "calico-apiserver-certs" (UniqueName: "kubernetes.io/secret/72807fb9-51c9-4fcc-944c-8a4600956601-calico-apiserver-certs") pod "calico-apiserver-77746f7c67-9cxxs" (UID: "72807fb9-51c9-4fcc-944c-8a4600956601") : secret "calico-apiserver-certs" not found Feb 12 19:39:09.031914 kernel: audit: type=1300 audit(1707766748.948:1338): arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffc4112ff0 a2=0 a3=ffffbd4926c0 items=0 ppid=2675 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:08.948000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:09.046425 kernel: audit: type=1327 audit(1707766748.948:1338): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:08.978000 audit[4755]: NETFILTER_CFG table=nat:115 family=2 entries=20 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:09.066167 kernel: audit: type=1325 audit(1707766748.978:1339): table=nat:115 family=2 entries=20 op=nft_register_rule pid=4755 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:08.978000 audit[4755]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffc4112ff0 a2=0 a3=ffffbd4926c0 items=0 ppid=2675 pid=4755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:08.978000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:09.720640 env[1376]: time="2024-02-12T19:39:09.720571285Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77746f7c67-c2jrl,Uid:ef435f59-9293-415a-a148-cc273dac3869,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:39:09.736660 env[1376]: time="2024-02-12T19:39:09.736413471Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77746f7c67-9cxxs,Uid:72807fb9-51c9-4fcc-944c-8a4600956601,Namespace:calico-apiserver,Attempt:0,}" Feb 12 19:39:09.926410 systemd-networkd[1523]: caliea15cdd35e7: Link UP Feb 12 19:39:09.935141 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Feb 12 19:39:09.935265 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliea15cdd35e7: link becomes ready Feb 12 19:39:09.940098 systemd-networkd[1523]: caliea15cdd35e7: Gained carrier Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.816 [INFO][4762] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0 calico-apiserver-77746f7c67- calico-apiserver ef435f59-9293-415a-a148-cc273dac3869 879 0 2024-02-12 19:39:08 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77746f7c67 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-04a5975e1d calico-apiserver-77746f7c67-c2jrl eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] caliea15cdd35e7 [] []}} ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-c2jrl" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.816 [INFO][4762] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-c2jrl" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.867 [INFO][4787] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" HandleID="k8s-pod-network.e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.881 [INFO][4787] ipam_plugin.go 268: Auto assigning IP ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" HandleID="k8s-pod-network.e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x40003165e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-04a5975e1d", "pod":"calico-apiserver-77746f7c67-c2jrl", "timestamp":"2024-02-12 19:39:09.867781398 +0000 UTC"}, Hostname:"ci-3510.3.2-a-04a5975e1d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.881 [INFO][4787] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.881 [INFO][4787] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.881 [INFO][4787] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-04a5975e1d' Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.882 [INFO][4787] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.886 [INFO][4787] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.897 [INFO][4787] ipam.go 489: Trying affinity for 192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.905 [INFO][4787] ipam.go 155: Attempting to load block cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.907 [INFO][4787] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.907 [INFO][4787] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.92.0/26 handle="k8s-pod-network.e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.910 [INFO][4787] ipam.go 1682: Creating new handle: k8s-pod-network.e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.915 [INFO][4787] ipam.go 1203: Writing block in order to claim IPs block=192.168.92.0/26 handle="k8s-pod-network.e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.922 [INFO][4787] ipam.go 1216: Successfully claimed IPs: [192.168.92.5/26] block=192.168.92.0/26 handle="k8s-pod-network.e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.922 [INFO][4787] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.92.5/26] handle="k8s-pod-network.e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.922 [INFO][4787] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:39:09.962711 env[1376]: 2024-02-12 19:39:09.922 [INFO][4787] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.92.5/26] IPv6=[] ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" HandleID="k8s-pod-network.e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" Feb 12 19:39:09.963300 env[1376]: 2024-02-12 19:39:09.924 [INFO][4762] k8s.go 385: Populated endpoint ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-c2jrl" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0", GenerateName:"calico-apiserver-77746f7c67-", Namespace:"calico-apiserver", SelfLink:"", UID:"ef435f59-9293-415a-a148-cc273dac3869", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 39, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77746f7c67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"", Pod:"calico-apiserver-77746f7c67-c2jrl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.92.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea15cdd35e7", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:39:09.963300 env[1376]: 2024-02-12 19:39:09.924 [INFO][4762] k8s.go 386: Calico CNI using IPs: [192.168.92.5/32] ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-c2jrl" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" Feb 12 19:39:09.963300 env[1376]: 2024-02-12 19:39:09.924 [INFO][4762] dataplane_linux.go 68: Setting the host side veth name to caliea15cdd35e7 ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-c2jrl" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" Feb 12 19:39:09.963300 env[1376]: 2024-02-12 19:39:09.948 [INFO][4762] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-c2jrl" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" Feb 12 19:39:09.963300 env[1376]: 2024-02-12 19:39:09.948 [INFO][4762] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-c2jrl" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0", GenerateName:"calico-apiserver-77746f7c67-", Namespace:"calico-apiserver", SelfLink:"", UID:"ef435f59-9293-415a-a148-cc273dac3869", ResourceVersion:"879", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 39, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77746f7c67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed", Pod:"calico-apiserver-77746f7c67-c2jrl", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.92.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"caliea15cdd35e7", MAC:"8e:4e:9a:ca:08:5b", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:39:09.963300 env[1376]: 2024-02-12 19:39:09.959 [INFO][4762] k8s.go 491: Wrote updated endpoint to datastore ContainerID="e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-c2jrl" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--c2jrl-eth0" Feb 12 19:39:10.002708 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia240b3cc445: link becomes ready Feb 12 19:39:10.002382 systemd-networkd[1523]: calia240b3cc445: Link UP Feb 12 19:39:10.002703 systemd-networkd[1523]: calia240b3cc445: Gained carrier Feb 12 19:39:10.009725 env[1376]: time="2024-02-12T19:39:10.005469234Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:39:10.009725 env[1376]: time="2024-02-12T19:39:10.005515672Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:39:10.009725 env[1376]: time="2024-02-12T19:39:10.005526672Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:39:10.009725 env[1376]: time="2024-02-12T19:39:10.005761464Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed pid=4819 runtime=io.containerd.runc.v2 Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.842 [INFO][4772] plugin.go 327: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0 calico-apiserver-77746f7c67- calico-apiserver 72807fb9-51c9-4fcc-944c-8a4600956601 884 0 2024-02-12 19:39:08 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:77746f7c67 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.2-a-04a5975e1d calico-apiserver-77746f7c67-9cxxs eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia240b3cc445 [] []}} ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-9cxxs" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.842 [INFO][4772] k8s.go 76: Extracted identifiers for CmdAddK8s ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-9cxxs" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.893 [INFO][4792] ipam_plugin.go 228: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" HandleID="k8s-pod-network.a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.914 [INFO][4792] ipam_plugin.go 268: Auto assigning IP ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" HandleID="k8s-pod-network.a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0x4000317440), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.2-a-04a5975e1d", "pod":"calico-apiserver-77746f7c67-9cxxs", "timestamp":"2024-02-12 19:39:09.893731963 +0000 UTC"}, Hostname:"ci-3510.3.2-a-04a5975e1d", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.914 [INFO][4792] ipam_plugin.go 356: About to acquire host-wide IPAM lock. Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.922 [INFO][4792] ipam_plugin.go 371: Acquired host-wide IPAM lock. Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.922 [INFO][4792] ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.2-a-04a5975e1d' Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.929 [INFO][4792] ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.949 [INFO][4792] ipam.go 372: Looking up existing affinities for host host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.968 [INFO][4792] ipam.go 489: Trying affinity for 192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.970 [INFO][4792] ipam.go 155: Attempting to load block cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.975 [INFO][4792] ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.92.0/26 host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.975 [INFO][4792] ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.92.0/26 handle="k8s-pod-network.a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.976 [INFO][4792] ipam.go 1682: Creating new handle: k8s-pod-network.a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.980 [INFO][4792] ipam.go 1203: Writing block in order to claim IPs block=192.168.92.0/26 handle="k8s-pod-network.a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.988 [INFO][4792] ipam.go 1216: Successfully claimed IPs: [192.168.92.6/26] block=192.168.92.0/26 handle="k8s-pod-network.a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.988 [INFO][4792] ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.92.6/26] handle="k8s-pod-network.a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" host="ci-3510.3.2-a-04a5975e1d" Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.988 [INFO][4792] ipam_plugin.go 377: Released host-wide IPAM lock. Feb 12 19:39:10.020105 env[1376]: 2024-02-12 19:39:09.988 [INFO][4792] ipam_plugin.go 286: Calico CNI IPAM assigned addresses IPv4=[192.168.92.6/26] IPv6=[] ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" HandleID="k8s-pod-network.a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Workload="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" Feb 12 19:39:10.020717 env[1376]: 2024-02-12 19:39:09.990 [INFO][4772] k8s.go 385: Populated endpoint ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-9cxxs" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0", GenerateName:"calico-apiserver-77746f7c67-", Namespace:"calico-apiserver", SelfLink:"", UID:"72807fb9-51c9-4fcc-944c-8a4600956601", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 39, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77746f7c67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"", Pod:"calico-apiserver-77746f7c67-9cxxs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.92.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia240b3cc445", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:39:10.020717 env[1376]: 2024-02-12 19:39:09.990 [INFO][4772] k8s.go 386: Calico CNI using IPs: [192.168.92.6/32] ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-9cxxs" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" Feb 12 19:39:10.020717 env[1376]: 2024-02-12 19:39:09.990 [INFO][4772] dataplane_linux.go 68: Setting the host side veth name to calia240b3cc445 ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-9cxxs" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" Feb 12 19:39:10.020717 env[1376]: 2024-02-12 19:39:10.004 [INFO][4772] dataplane_linux.go 479: Disabling IPv4 forwarding ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-9cxxs" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" Feb 12 19:39:10.020717 env[1376]: 2024-02-12 19:39:10.004 [INFO][4772] k8s.go 413: Added Mac, interface name, and active container ID to endpoint ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-9cxxs" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0", GenerateName:"calico-apiserver-77746f7c67-", Namespace:"calico-apiserver", SelfLink:"", UID:"72807fb9-51c9-4fcc-944c-8a4600956601", ResourceVersion:"884", Generation:0, CreationTimestamp:time.Date(2024, time.February, 12, 19, 39, 8, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"77746f7c67", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.2-a-04a5975e1d", ContainerID:"a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf", Pod:"calico-apiserver-77746f7c67-9cxxs", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.92.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia240b3cc445", MAC:"8a:f8:0f:5f:92:5d", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Feb 12 19:39:10.020717 env[1376]: 2024-02-12 19:39:10.013 [INFO][4772] k8s.go 491: Wrote updated endpoint to datastore ContainerID="a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf" Namespace="calico-apiserver" Pod="calico-apiserver-77746f7c67-9cxxs" WorkloadEndpoint="ci--3510.3.2--a--04a5975e1d-k8s-calico--apiserver--77746f7c67--9cxxs-eth0" Feb 12 19:39:10.029305 systemd[1]: Started cri-containerd-e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed.scope. Feb 12 19:39:10.050727 env[1376]: time="2024-02-12T19:39:10.050535044Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Feb 12 19:39:10.050727 env[1376]: time="2024-02-12T19:39:10.050592202Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Feb 12 19:39:10.050727 env[1376]: time="2024-02-12T19:39:10.050603002Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Feb 12 19:39:10.050926 env[1376]: time="2024-02-12T19:39:10.050819034Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf pid=4873 runtime=io.containerd.runc.v2 Feb 12 19:39:10.049000 audit[4859]: NETFILTER_CFG table=filter:116 family=2 entries=55 op=nft_register_chain pid=4859 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:39:10.049000 audit[4859]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=28088 a0=3 a1=fffff9336a40 a2=0 a3=ffff91f5cfa8 items=0 ppid=4278 pid=4859 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.049000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.071000 audit: BPF prog-id=186 op=LOAD Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=4819 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533383933346364616361663565356264636439313165626630643062 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=4819 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533383933346364616361663565356264636439313165626630643062 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit: BPF prog-id=187 op=LOAD Feb 12 19:39:10.072000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=4819 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533383933346364616361663565356264636439313165626630643062 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit: BPF prog-id=188 op=LOAD Feb 12 19:39:10.072000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=4819 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533383933346364616361663565356264636439313165626630643062 Feb 12 19:39:10.072000 audit: BPF prog-id=188 op=UNLOAD Feb 12 19:39:10.072000 audit: BPF prog-id=187 op=UNLOAD Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { perfmon } for pid=4836 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit[4836]: AVC avc: denied { bpf } for pid=4836 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.072000 audit: BPF prog-id=189 op=LOAD Feb 12 19:39:10.072000 audit[4836]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=4819 pid=4836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.072000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6533383933346364616361663565356264636439313165626630643062 Feb 12 19:39:10.076015 systemd[1]: Started cri-containerd-a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf.scope. Feb 12 19:39:10.101342 env[1376]: time="2024-02-12T19:39:10.101302303Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77746f7c67-c2jrl,Uid:ef435f59-9293-415a-a148-cc273dac3869,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed\"" Feb 12 19:39:10.103257 env[1376]: time="2024-02-12T19:39:10.103226478Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:39:10.114000 audit[4908]: NETFILTER_CFG table=filter:117 family=2 entries=52 op=nft_register_chain pid=4908 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Feb 12 19:39:10.114000 audit[4908]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=26144 a0=3 a1=ffffc2933990 a2=0 a3=ffff836cefa8 items=0 ppid=4278 pid=4908 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.114000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.118000 audit: BPF prog-id=190 op=LOAD Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4873 pid=4885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623732333866663065393234646239656230653665303235643431 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4873 pid=4885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623732333866663065393234646239656230653665303235643431 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit: BPF prog-id=191 op=LOAD Feb 12 19:39:10.119000 audit[4885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4873 pid=4885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623732333866663065393234646239656230653665303235643431 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit: BPF prog-id=192 op=LOAD Feb 12 19:39:10.119000 audit[4885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4873 pid=4885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623732333866663065393234646239656230653665303235643431 Feb 12 19:39:10.119000 audit: BPF prog-id=192 op=UNLOAD Feb 12 19:39:10.119000 audit: BPF prog-id=191 op=UNLOAD Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { perfmon } for pid=4885 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit[4885]: AVC avc: denied { bpf } for pid=4885 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:10.119000 audit: BPF prog-id=193 op=LOAD Feb 12 19:39:10.119000 audit[4885]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4873 pid=4885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:10.119000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6134623732333866663065393234646239656230653665303235643431 Feb 12 19:39:10.141430 env[1376]: time="2024-02-12T19:39:10.141385960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-77746f7c67-9cxxs,Uid:72807fb9-51c9-4fcc-944c-8a4600956601,Namespace:calico-apiserver,Attempt:0,} returns sandbox id \"a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf\"" Feb 12 19:39:11.455989 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3044245117.mount: Deactivated successfully. Feb 12 19:39:11.612790 systemd-networkd[1523]: caliea15cdd35e7: Gained IPv6LL Feb 12 19:39:11.613040 systemd-networkd[1523]: calia240b3cc445: Gained IPv6LL Feb 12 19:39:13.161636 env[1376]: time="2024-02-12T19:39:13.161579626Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:13.168710 env[1376]: time="2024-02-12T19:39:13.168649073Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:13.174128 env[1376]: time="2024-02-12T19:39:13.172988051Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:13.182485 env[1376]: time="2024-02-12T19:39:13.182446380Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:13.184645 env[1376]: time="2024-02-12T19:39:13.182969923Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 19:39:13.185562 env[1376]: time="2024-02-12T19:39:13.185534439Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\"" Feb 12 19:39:13.189727 env[1376]: time="2024-02-12T19:39:13.185617436Z" level=info msg="CreateContainer within sandbox \"e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:39:13.234023 env[1376]: time="2024-02-12T19:39:13.233966208Z" level=info msg="CreateContainer within sandbox \"e38934cdacaf5e5bdcd911ebf0d0b6cf4a7435297dbb53b34c324bcefd94fbed\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34\"" Feb 12 19:39:13.234575 env[1376]: time="2024-02-12T19:39:13.234538869Z" level=info msg="StartContainer for \"232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34\"" Feb 12 19:39:13.255842 systemd[1]: Started cri-containerd-232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34.scope. Feb 12 19:39:13.271457 systemd[1]: run-containerd-runc-k8s.io-232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34-runc.lX2gdE.mount: Deactivated successfully. Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.409000 audit: BPF prog-id=194 op=LOAD Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000195b38 a2=10 a3=0 items=0 ppid=4819 pid=4926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:13.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326261333765313337663764343436666565366430356432643061 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001955a0 a2=3c a3=0 items=0 ppid=4819 pid=4926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:13.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326261333765313337663764343436666565366430356432643061 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit: BPF prog-id=195 op=LOAD Feb 12 19:39:13.410000 audit[4926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001958e0 a2=78 a3=0 items=0 ppid=4819 pid=4926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:13.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326261333765313337663764343436666565366430356432643061 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit: BPF prog-id=196 op=LOAD Feb 12 19:39:13.410000 audit[4926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000195670 a2=78 a3=0 items=0 ppid=4819 pid=4926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:13.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326261333765313337663764343436666565366430356432643061 Feb 12 19:39:13.410000 audit: BPF prog-id=196 op=UNLOAD Feb 12 19:39:13.410000 audit: BPF prog-id=195 op=UNLOAD Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { perfmon } for pid=4926 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit[4926]: AVC avc: denied { bpf } for pid=4926 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:13.410000 audit: BPF prog-id=197 op=LOAD Feb 12 19:39:13.410000 audit[4926]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000195b40 a2=78 a3=0 items=0 ppid=4819 pid=4926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:13.410000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3233326261333765313337663764343436666565366430356432643061 Feb 12 19:39:13.880740 env[1376]: time="2024-02-12T19:39:13.880686805Z" level=info msg="StartContainer for \"232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34\" returns successfully" Feb 12 19:39:14.046182 env[1376]: time="2024-02-12T19:39:14.046084302Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:14.069774 env[1376]: time="2024-02-12T19:39:14.069718891Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:14.091157 env[1376]: time="2024-02-12T19:39:14.091108312Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.27.0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:14.096096 env[1376]: time="2024-02-12T19:39:14.096057751Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:5ff0bdc8d0b2e9d7819703b18867f60f9153ed01da81e2bbfa22002abec9dc26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Feb 12 19:39:14.096715 env[1376]: time="2024-02-12T19:39:14.096662731Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.27.0\" returns image reference \"sha256:24494ef6c7de0e2dcf21ad9fb6c94801c53f120443e256a5e1b54eccd57058a9\"" Feb 12 19:39:14.100714 env[1376]: time="2024-02-12T19:39:14.100660441Z" level=info msg="CreateContainer within sandbox \"a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Feb 12 19:39:14.138229 env[1376]: time="2024-02-12T19:39:14.137790309Z" level=info msg="CreateContainer within sandbox \"a4b7238ff0e924db9eb0e6e025d411c48ea4e1f81c8f41de3565d33f426c50cf\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0f2af81650ae51cef8abc1f752deaecab923a7264d909b8460015b10f9a4a4ec\"" Feb 12 19:39:14.139000 env[1376]: time="2024-02-12T19:39:14.138977550Z" level=info msg="StartContainer for \"0f2af81650ae51cef8abc1f752deaecab923a7264d909b8460015b10f9a4a4ec\"" Feb 12 19:39:14.155882 systemd[1]: Started cri-containerd-0f2af81650ae51cef8abc1f752deaecab923a7264d909b8460015b10f9a4a4ec.scope. Feb 12 19:39:14.213136 kernel: kauditd_printk_skb: 179 callbacks suppressed Feb 12 19:39:14.213273 kernel: audit: type=1400 audit(1707766754.189:1396): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.238402 kernel: audit: type=1400 audit(1707766754.189:1397): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.241826 kubelet[2501]: I0212 19:39:14.241432 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77746f7c67-c2jrl" podStartSLOduration=3.1600794150000002 podCreationTimestamp="2024-02-12 19:39:08 +0000 UTC" firstStartedPulling="2024-02-12 19:39:10.102745455 +0000 UTC m=+77.607675107" lastFinishedPulling="2024-02-12 19:39:13.184061047 +0000 UTC m=+80.688990699" observedRunningTime="2024-02-12 19:39:14.241061778 +0000 UTC m=+81.745991390" watchObservedRunningTime="2024-02-12 19:39:14.241395007 +0000 UTC m=+81.746324659" Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.261202 kernel: audit: type=1400 audit(1707766754.189:1398): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.294465 kernel: audit: type=1400 audit(1707766754.189:1399): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.313008 kernel: audit: type=1400 audit(1707766754.189:1400): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.331363 kernel: audit: type=1400 audit(1707766754.189:1401): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.353771 kernel: audit: type=1400 audit(1707766754.189:1402): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.382171 env[1376]: time="2024-02-12T19:39:14.382119534Z" level=info msg="StartContainer for \"0f2af81650ae51cef8abc1f752deaecab923a7264d909b8460015b10f9a4a4ec\" returns successfully" Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.404086 kernel: audit: type=1400 audit(1707766754.189:1403): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.404184 kernel: audit: type=1400 audit(1707766754.189:1404): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.189000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.424243 kernel: audit: type=1400 audit(1707766754.189:1405): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.189000 audit: BPF prog-id=198 op=LOAD Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=4873 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:14.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066326166383136353061653531636566386162633166373532646561 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=4873 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:14.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066326166383136353061653531636566386162633166373532646561 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit: BPF prog-id=199 op=LOAD Feb 12 19:39:14.213000 audit[4964]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=4873 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:14.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066326166383136353061653531636566386162633166373532646561 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit: BPF prog-id=200 op=LOAD Feb 12 19:39:14.213000 audit[4964]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=4873 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:14.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066326166383136353061653531636566386162633166373532646561 Feb 12 19:39:14.213000 audit: BPF prog-id=200 op=UNLOAD Feb 12 19:39:14.213000 audit: BPF prog-id=199 op=UNLOAD Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { perfmon } for pid=4964 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit[4964]: AVC avc: denied { bpf } for pid=4964 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:39:14.213000 audit: BPF prog-id=201 op=LOAD Feb 12 19:39:14.213000 audit[4964]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=4873 pid=4964 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:14.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066326166383136353061653531636566386162633166373532646561 Feb 12 19:39:14.357000 audit[4983]: NETFILTER_CFG table=filter:118 family=2 entries=10 op=nft_register_rule pid=4983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:14.357000 audit[4983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffeb92cda0 a2=0 a3=ffff88e476c0 items=0 ppid=2675 pid=4983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:14.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:14.361000 audit[4983]: NETFILTER_CFG table=nat:119 family=2 entries=20 op=nft_register_rule pid=4983 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:14.361000 audit[4983]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffeb92cda0 a2=0 a3=ffff88e476c0 items=0 ppid=2675 pid=4983 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:14.361000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:14.601000 audit[4937]: AVC avc: denied { watch } for pid=4937 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.1282445933/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c832,c916 tclass=file permissive=0 Feb 12 19:39:14.601000 audit[4937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000951c00 a2=fc6 a3=0 items=0 ppid=4819 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 key=(null) Feb 12 19:39:14.601000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:39:15.204261 kubelet[2501]: I0212 19:39:15.204228 2501 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-77746f7c67-9cxxs" podStartSLOduration=3.250225167 podCreationTimestamp="2024-02-12 19:39:08 +0000 UTC" firstStartedPulling="2024-02-12 19:39:10.142947748 +0000 UTC m=+77.647877400" lastFinishedPulling="2024-02-12 19:39:14.096910723 +0000 UTC m=+81.601840375" observedRunningTime="2024-02-12 19:39:15.202246285 +0000 UTC m=+82.707175937" watchObservedRunningTime="2024-02-12 19:39:15.204188142 +0000 UTC m=+82.709117794" Feb 12 19:39:15.220000 audit[4998]: NETFILTER_CFG table=filter:120 family=2 entries=10 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:15.220000 audit[4998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=3548 a0=3 a1=ffffe3523660 a2=0 a3=ffff8ee466c0 items=0 ppid=2675 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:15.220000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:15.223000 audit[4998]: NETFILTER_CFG table=nat:121 family=2 entries=20 op=nft_register_rule pid=4998 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:15.223000 audit[4998]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=5484 a0=3 a1=ffffe3523660 a2=0 a3=ffff8ee466c0 items=0 ppid=2675 pid=4998 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:15.223000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:15.391000 audit[4975]: AVC avc: denied { watch } for pid=4975 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.3732306417/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c583,c643 tclass=file permissive=0 Feb 12 19:39:15.391000 audit[4975]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000b5a920 a2=fc6 a3=0 items=0 ppid=4873 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 key=(null) Feb 12 19:39:15.391000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:39:39.747335 systemd[1]: run-containerd-runc-k8s.io-232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34-runc.5JuCG5.mount: Deactivated successfully. Feb 12 19:39:39.816000 audit[5116]: NETFILTER_CFG table=filter:122 family=2 entries=9 op=nft_register_rule pid=5116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:39.822004 kernel: kauditd_printk_skb: 65 callbacks suppressed Feb 12 19:39:39.822054 kernel: audit: type=1325 audit(1707766779.816:1420): table=filter:122 family=2 entries=9 op=nft_register_rule pid=5116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:39.816000 audit[5116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffcef68350 a2=0 a3=ffffb83176c0 items=0 ppid=2675 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.870406 kernel: audit: type=1300 audit(1707766779.816:1420): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffcef68350 a2=0 a3=ffffb83176c0 items=0 ppid=2675 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.816000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:39.885203 kernel: audit: type=1327 audit(1707766779.816:1420): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:39.821000 audit[5116]: NETFILTER_CFG table=nat:123 family=2 entries=27 op=nft_register_chain pid=5116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:39.899461 kernel: audit: type=1325 audit(1707766779.821:1421): table=nat:123 family=2 entries=27 op=nft_register_chain pid=5116 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:39.821000 audit[5116]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=ffffcef68350 a2=0 a3=ffffb83176c0 items=0 ppid=2675 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.928139 kernel: audit: type=1300 audit(1707766779.821:1421): arch=c00000b7 syscall=211 success=yes exit=8980 a0=3 a1=ffffcef68350 a2=0 a3=ffffb83176c0 items=0 ppid=2675 pid=5116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.821000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:39.941485 kernel: audit: type=1327 audit(1707766779.821:1421): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:39.891000 audit[5118]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:39.956161 kernel: audit: type=1325 audit(1707766779.891:1422): table=filter:124 family=2 entries=8 op=nft_register_rule pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:39.891000 audit[5118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe0ac0600 a2=0 a3=ffffa39456c0 items=0 ppid=2675 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.984010 kernel: audit: type=1300 audit(1707766779.891:1422): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffe0ac0600 a2=0 a3=ffffa39456c0 items=0 ppid=2675 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:39.997268 kernel: audit: type=1327 audit(1707766779.891:1422): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:39.896000 audit[5118]: NETFILTER_CFG table=nat:125 family=2 entries=34 op=nft_register_chain pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:40.013580 kernel: audit: type=1325 audit(1707766779.896:1423): table=nat:125 family=2 entries=34 op=nft_register_chain pid=5118 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:39:39.896000 audit[5118]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=10868 a0=3 a1=ffffe0ac0600 a2=0 a3=ffffa39456c0 items=0 ppid=2675 pid=5118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:39:39.896000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:39:40.427995 systemd[1]: run-containerd-runc-k8s.io-0f2af81650ae51cef8abc1f752deaecab923a7264d909b8460015b10f9a4a4ec-runc.N3pC7b.mount: Deactivated successfully. Feb 12 19:39:49.214000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.219439 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:39:49.219553 kernel: audit: type=1400 audit(1707766789.214:1425): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.214000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.263783 kernel: audit: type=1400 audit(1707766789.214:1424): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.214000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40067b0120 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:39:49.291769 kernel: audit: type=1300 audit(1707766789.214:1425): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40067b0120 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:39:49.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:39:49.319833 kernel: audit: type=1327 audit(1707766789.214:1425): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:39:49.319969 kernel: audit: type=1400 audit(1707766789.214:1426): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.214000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.214000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40066778c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:39:49.371306 kernel: audit: type=1300 audit(1707766789.214:1426): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=40066778c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:39:49.371425 kernel: audit: type=1327 audit(1707766789.214:1426): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:39:49.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:39:49.214000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.418240 kernel: audit: type=1400 audit(1707766789.214:1427): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.418385 kernel: audit: type=1300 audit(1707766789.214:1427): arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4006677950 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:39:49.214000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6d a1=4006677950 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:39:49.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:39:49.470436 kernel: audit: type=1327 audit(1707766789.214:1427): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:39:49.214000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400cc36660 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:39:49.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:39:49.279000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.279000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=40067b0360 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:39:49.279000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:39:49.406000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:49.406000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6b a1=400cc36a50 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:39:49.406000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:39:50.369000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:50.369000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c84480 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:39:50.369000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:39:50.370000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:50.370000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001c82d50 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:39:50.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:39:57.694000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:57.700063 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 19:39:57.700156 kernel: audit: type=1400 audit(1707766797.694:1432): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:57.694000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:57.743127 kernel: audit: type=1400 audit(1707766797.694:1433): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:57.743240 kernel: audit: type=1300 audit(1707766797.694:1433): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001060d20 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:39:57.694000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001060d20 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:39:57.694000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:39:57.797284 kernel: audit: type=1327 audit(1707766797.694:1433): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:39:57.797435 kernel: audit: type=1400 audit(1707766797.694:1434): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:57.694000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:57.694000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001060fa0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:39:57.851432 kernel: audit: type=1300 audit(1707766797.694:1434): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4001060fa0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:39:57.851696 kernel: audit: type=1327 audit(1707766797.694:1434): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:39:57.694000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:39:57.695000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:57.899515 kernel: audit: type=1400 audit(1707766797.695:1435): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:39:57.695000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010611c0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:39:57.928790 kernel: audit: type=1300 audit(1707766797.695:1435): arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010611c0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:39:57.695000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:39:57.952709 kernel: audit: type=1327 audit(1707766797.695:1435): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:39:57.694000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=4001c84bc0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:39:57.694000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:04.648786 systemd[1]: run-containerd-runc-k8s.io-e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0-runc.SJG2dD.mount: Deactivated successfully. Feb 12 19:40:09.736410 systemd[1]: run-containerd-runc-k8s.io-232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34-runc.Yo1vaK.mount: Deactivated successfully. Feb 12 19:40:09.765444 systemd[1]: run-containerd-runc-k8s.io-0f2af81650ae51cef8abc1f752deaecab923a7264d909b8460015b10f9a4a4ec-runc.m9oVCD.mount: Deactivated successfully. Feb 12 19:40:14.602000 audit[4937]: AVC avc: denied { watch } for pid=4937 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.1282445933/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c832,c916 tclass=file permissive=0 Feb 12 19:40:14.607661 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:40:14.607808 kernel: audit: type=1400 audit(1707766814.602:1436): avc: denied { watch } for pid=4937 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.1282445933/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c832,c916 tclass=file permissive=0 Feb 12 19:40:14.602000 audit[4937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a92760 a2=fc6 a3=0 items=0 ppid=4819 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 key=(null) Feb 12 19:40:14.658344 kernel: audit: type=1300 audit(1707766814.602:1436): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a92760 a2=fc6 a3=0 items=0 ppid=4819 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 key=(null) Feb 12 19:40:14.658696 kernel: audit: type=1327 audit(1707766814.602:1436): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:40:14.602000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:40:15.393000 audit[4975]: AVC avc: denied { watch } for pid=4975 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.3732306417/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c583,c643 tclass=file permissive=0 Feb 12 19:40:15.393000 audit[4975]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40019b54c0 a2=fc6 a3=0 items=0 ppid=4873 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 key=(null) Feb 12 19:40:15.444894 kernel: audit: type=1400 audit(1707766815.393:1437): avc: denied { watch } for pid=4975 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.3732306417/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c583,c643 tclass=file permissive=0 Feb 12 19:40:15.445038 kernel: audit: type=1300 audit(1707766815.393:1437): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=40019b54c0 a2=fc6 a3=0 items=0 ppid=4873 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 key=(null) Feb 12 19:40:15.393000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:40:15.468555 kernel: audit: type=1327 audit(1707766815.393:1437): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:40:20.776000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.13:22-10.200.12.6:58930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:20.778312 systemd[1]: Started sshd@7-10.200.20.13:22-10.200.12.6:58930.service. Feb 12 19:40:20.801724 kernel: audit: type=1130 audit(1707766820.776:1438): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.13:22-10.200.12.6:58930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:21.197000 audit[5226]: USER_ACCT pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.199722 sshd[5226]: Accepted publickey for core from 10.200.12.6 port 58930 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:21.201479 sshd[5226]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:21.199000 audit[5226]: CRED_ACQ pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.228016 systemd[1]: Started session-10.scope. Feb 12 19:40:21.229218 systemd-logind[1365]: New session 10 of user core. Feb 12 19:40:21.246597 kernel: audit: type=1101 audit(1707766821.197:1439): pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.247813 kernel: audit: type=1103 audit(1707766821.199:1440): pid=5226 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.267710 kernel: audit: type=1006 audit(1707766821.199:1441): pid=5226 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Feb 12 19:40:21.268051 kernel: audit: type=1300 audit(1707766821.199:1441): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb999020 a2=3 a3=1 items=0 ppid=1 pid=5226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:21.199000 audit[5226]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdb999020 a2=3 a3=1 items=0 ppid=1 pid=5226 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:21.199000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:21.300434 kernel: audit: type=1327 audit(1707766821.199:1441): proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:21.232000 audit[5226]: USER_START pid=5226 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.326039 kernel: audit: type=1105 audit(1707766821.232:1442): pid=5226 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.234000 audit[5240]: CRED_ACQ pid=5240 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.348094 kernel: audit: type=1103 audit(1707766821.234:1443): pid=5240 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.730701 sshd[5226]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:21.729000 audit[5226]: USER_END pid=5226 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.729000 audit[5226]: CRED_DISP pid=5226 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.758915 systemd[1]: sshd@7-10.200.20.13:22-10.200.12.6:58930.service: Deactivated successfully. Feb 12 19:40:21.759772 systemd[1]: session-10.scope: Deactivated successfully. Feb 12 19:40:21.760983 systemd-logind[1365]: Session 10 logged out. Waiting for processes to exit. Feb 12 19:40:21.761840 systemd-logind[1365]: Removed session 10. Feb 12 19:40:21.779888 kernel: audit: type=1106 audit(1707766821.729:1444): pid=5226 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.780069 kernel: audit: type=1104 audit(1707766821.729:1445): pid=5226 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:21.756000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.20.13:22-10.200.12.6:58930 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:26.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.13:22-10.200.12.6:58932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:26.800966 systemd[1]: Started sshd@8-10.200.20.13:22-10.200.12.6:58932.service. Feb 12 19:40:26.806189 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:40:26.806282 kernel: audit: type=1130 audit(1707766826.800:1447): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.13:22-10.200.12.6:58932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:27.213000 audit[5251]: USER_ACCT pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.213928 sshd[5251]: Accepted publickey for core from 10.200.12.6 port 58932 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:27.237886 kernel: audit: type=1101 audit(1707766827.213:1448): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.238704 sshd[5251]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:27.237000 audit[5251]: CRED_ACQ pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.266397 systemd-logind[1365]: New session 11 of user core. Feb 12 19:40:27.267220 systemd[1]: Started session-11.scope. Feb 12 19:40:27.267698 kernel: audit: type=1103 audit(1707766827.237:1449): pid=5251 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.237000 audit[5251]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4052db0 a2=3 a3=1 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.282688 kernel: audit: type=1006 audit(1707766827.237:1450): pid=5251 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Feb 12 19:40:27.237000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:27.313990 kernel: audit: type=1300 audit(1707766827.237:1450): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc4052db0 a2=3 a3=1 items=0 ppid=1 pid=5251 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:27.314088 kernel: audit: type=1327 audit(1707766827.237:1450): proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:27.314000 audit[5251]: USER_START pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.342357 kernel: audit: type=1105 audit(1707766827.314:1451): pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.341000 audit[5253]: CRED_ACQ pid=5253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.364699 kernel: audit: type=1103 audit(1707766827.341:1452): pid=5253 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.645854 sshd[5251]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:27.646000 audit[5251]: USER_END pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.649303 systemd-logind[1365]: Session 11 logged out. Waiting for processes to exit. Feb 12 19:40:27.650416 systemd[1]: session-11.scope: Deactivated successfully. Feb 12 19:40:27.651641 systemd-logind[1365]: Removed session 11. Feb 12 19:40:27.652245 systemd[1]: sshd@8-10.200.20.13:22-10.200.12.6:58932.service: Deactivated successfully. Feb 12 19:40:27.647000 audit[5251]: CRED_DISP pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.692742 kernel: audit: type=1106 audit(1707766827.646:1453): pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.692816 kernel: audit: type=1104 audit(1707766827.647:1454): pid=5251 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:27.651000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.20.13:22-10.200.12.6:58932 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:27.877905 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.LVvY2r.mount: Deactivated successfully. Feb 12 19:40:32.722000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.13:22-10.200.12.6:41376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:32.722606 systemd[1]: Started sshd@9-10.200.20.13:22-10.200.12.6:41376.service. Feb 12 19:40:32.727864 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:40:32.727959 kernel: audit: type=1130 audit(1707766832.722:1456): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.13:22-10.200.12.6:41376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:33.170000 audit[5287]: USER_ACCT pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.173026 sshd[5287]: Accepted publickey for core from 10.200.12.6 port 41376 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:33.174963 sshd[5287]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:33.170000 audit[5287]: CRED_ACQ pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.217455 kernel: audit: type=1101 audit(1707766833.170:1457): pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.217582 kernel: audit: type=1103 audit(1707766833.170:1458): pid=5287 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.220894 kernel: audit: type=1006 audit(1707766833.170:1459): pid=5287 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Feb 12 19:40:33.170000 audit[5287]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff693c070 a2=3 a3=1 items=0 ppid=1 pid=5287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:33.257748 kernel: audit: type=1300 audit(1707766833.170:1459): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff693c070 a2=3 a3=1 items=0 ppid=1 pid=5287 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:33.170000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:33.266393 kernel: audit: type=1327 audit(1707766833.170:1459): proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:33.269516 systemd[1]: Started session-12.scope. Feb 12 19:40:33.269649 systemd-logind[1365]: New session 12 of user core. Feb 12 19:40:33.274000 audit[5287]: USER_START pid=5287 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.299000 audit[5289]: CRED_ACQ pid=5289 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.326118 kernel: audit: type=1105 audit(1707766833.274:1460): pid=5287 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.326230 kernel: audit: type=1103 audit(1707766833.299:1461): pid=5289 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.628011 sshd[5287]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:33.628000 audit[5287]: USER_END pid=5287 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.634956 systemd[1]: session-12.scope: Deactivated successfully. Feb 12 19:40:33.635792 systemd[1]: sshd@9-10.200.20.13:22-10.200.12.6:41376.service: Deactivated successfully. Feb 12 19:40:33.628000 audit[5287]: CRED_DISP pid=5287 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.655472 systemd-logind[1365]: Session 12 logged out. Waiting for processes to exit. Feb 12 19:40:33.676191 kernel: audit: type=1106 audit(1707766833.628:1462): pid=5287 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.676351 kernel: audit: type=1104 audit(1707766833.628:1463): pid=5287 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:33.633000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.20.13:22-10.200.12.6:41376 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:33.676956 systemd-logind[1365]: Removed session 12. Feb 12 19:40:33.703518 systemd[1]: Started sshd@10-10.200.20.13:22-10.200.12.6:41380.service. Feb 12 19:40:33.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.13:22-10.200.12.6:41380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:34.151000 audit[5300]: USER_ACCT pid=5300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:34.152330 sshd[5300]: Accepted publickey for core from 10.200.12.6 port 41380 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:34.152000 audit[5300]: CRED_ACQ pid=5300 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:34.152000 audit[5300]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd826ac90 a2=3 a3=1 items=0 ppid=1 pid=5300 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:34.152000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:34.154022 sshd[5300]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:34.158871 systemd[1]: Started session-13.scope. Feb 12 19:40:34.160009 systemd-logind[1365]: New session 13 of user core. Feb 12 19:40:34.163000 audit[5300]: USER_START pid=5300 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:34.164000 audit[5302]: CRED_ACQ pid=5302 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:34.654366 systemd[1]: run-containerd-runc-k8s.io-e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0-runc.i0LkmO.mount: Deactivated successfully. Feb 12 19:40:35.240812 sshd[5300]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:35.242000 audit[5300]: USER_END pid=5300 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:35.242000 audit[5300]: CRED_DISP pid=5300 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:35.244552 systemd-logind[1365]: Session 13 logged out. Waiting for processes to exit. Feb 12 19:40:35.245717 systemd[1]: session-13.scope: Deactivated successfully. Feb 12 19:40:35.246740 systemd-logind[1365]: Removed session 13. Feb 12 19:40:35.247232 systemd[1]: sshd@10-10.200.20.13:22-10.200.12.6:41380.service: Deactivated successfully. Feb 12 19:40:35.246000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.20.13:22-10.200.12.6:41380 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:35.312044 systemd[1]: Started sshd@11-10.200.20.13:22-10.200.12.6:41394.service. Feb 12 19:40:35.312000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.13:22-10.200.12.6:41394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:35.732000 audit[5331]: USER_ACCT pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:35.733413 sshd[5331]: Accepted publickey for core from 10.200.12.6 port 41394 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:35.733000 audit[5331]: CRED_ACQ pid=5331 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:35.734000 audit[5331]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdbb10fd0 a2=3 a3=1 items=0 ppid=1 pid=5331 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:35.734000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:35.735055 sshd[5331]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:35.739867 systemd[1]: Started session-14.scope. Feb 12 19:40:35.740190 systemd-logind[1365]: New session 14 of user core. Feb 12 19:40:35.744000 audit[5331]: USER_START pid=5331 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:35.746000 audit[5333]: CRED_ACQ pid=5333 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:36.123895 sshd[5331]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:36.124000 audit[5331]: USER_END pid=5331 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:36.124000 audit[5331]: CRED_DISP pid=5331 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:36.126245 systemd[1]: session-14.scope: Deactivated successfully. Feb 12 19:40:36.126946 systemd-logind[1365]: Session 14 logged out. Waiting for processes to exit. Feb 12 19:40:36.127079 systemd[1]: sshd@11-10.200.20.13:22-10.200.12.6:41394.service: Deactivated successfully. Feb 12 19:40:36.126000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.20.13:22-10.200.12.6:41394 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:36.128337 systemd-logind[1365]: Removed session 14. Feb 12 19:40:39.431639 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.L8S7yT.mount: Deactivated successfully. Feb 12 19:40:40.425408 systemd[1]: run-containerd-runc-k8s.io-232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34-runc.MnPZG9.mount: Deactivated successfully. Feb 12 19:40:41.193000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.13:22-10.200.12.6:42318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:41.193876 systemd[1]: Started sshd@12-10.200.20.13:22-10.200.12.6:42318.service. Feb 12 19:40:41.198980 kernel: kauditd_printk_skb: 23 callbacks suppressed Feb 12 19:40:41.199117 kernel: audit: type=1130 audit(1707766841.193:1483): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.13:22-10.200.12.6:42318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:41.606000 audit[5402]: USER_ACCT pid=5402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:41.608178 sshd[5402]: Accepted publickey for core from 10.200.12.6 port 42318 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:41.631000 audit[5402]: CRED_ACQ pid=5402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:41.632423 sshd[5402]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:41.653508 kernel: audit: type=1101 audit(1707766841.606:1484): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:41.653608 kernel: audit: type=1103 audit(1707766841.631:1485): pid=5402 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:41.653649 kernel: audit: type=1006 audit(1707766841.631:1486): pid=5402 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=15 res=1 Feb 12 19:40:41.631000 audit[5402]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffac5abe0 a2=3 a3=1 items=0 ppid=1 pid=5402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:41.691445 kernel: audit: type=1300 audit(1707766841.631:1486): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffac5abe0 a2=3 a3=1 items=0 ppid=1 pid=5402 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:41.631000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:41.704320 kernel: audit: type=1327 audit(1707766841.631:1486): proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:41.706408 systemd-logind[1365]: New session 15 of user core. Feb 12 19:40:41.706900 systemd[1]: Started session-15.scope. Feb 12 19:40:41.710000 audit[5402]: USER_START pid=5402 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:41.712000 audit[5404]: CRED_ACQ pid=5404 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:41.758496 kernel: audit: type=1105 audit(1707766841.710:1487): pid=5402 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:41.758644 kernel: audit: type=1103 audit(1707766841.712:1488): pid=5404 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:42.027057 sshd[5402]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:42.027000 audit[5402]: USER_END pid=5402 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:42.027000 audit[5402]: CRED_DISP pid=5402 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:42.054083 systemd[1]: sshd@12-10.200.20.13:22-10.200.12.6:42318.service: Deactivated successfully. Feb 12 19:40:42.054926 systemd[1]: session-15.scope: Deactivated successfully. Feb 12 19:40:42.056401 systemd-logind[1365]: Session 15 logged out. Waiting for processes to exit. Feb 12 19:40:42.057334 systemd-logind[1365]: Removed session 15. Feb 12 19:40:42.074976 kernel: audit: type=1106 audit(1707766842.027:1489): pid=5402 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:42.075193 kernel: audit: type=1104 audit(1707766842.027:1490): pid=5402 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:42.053000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.20.13:22-10.200.12.6:42318 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.123075 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:40:47.123222 kernel: audit: type=1130 audit(1707766847.095:1492): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.13:22-10.200.12.6:43960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.095000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.13:22-10.200.12.6:43960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.097500 systemd[1]: Started sshd@13-10.200.20.13:22-10.200.12.6:43960.service. Feb 12 19:40:47.507000 audit[5418]: USER_ACCT pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.511890 sshd[5418]: Accepted publickey for core from 10.200.12.6 port 43960 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:47.513790 sshd[5418]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:47.511000 audit[5418]: CRED_ACQ pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.556130 kernel: audit: type=1101 audit(1707766847.507:1493): pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.556259 kernel: audit: type=1103 audit(1707766847.511:1494): pid=5418 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.570514 kernel: audit: type=1006 audit(1707766847.511:1495): pid=5418 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=16 res=1 Feb 12 19:40:47.511000 audit[5418]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff15969b0 a2=3 a3=1 items=0 ppid=1 pid=5418 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.595602 kernel: audit: type=1300 audit(1707766847.511:1495): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff15969b0 a2=3 a3=1 items=0 ppid=1 pid=5418 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:47.511000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:47.599116 systemd[1]: Started session-16.scope. Feb 12 19:40:47.604295 kernel: audit: type=1327 audit(1707766847.511:1495): proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:47.604318 systemd-logind[1365]: New session 16 of user core. Feb 12 19:40:47.607000 audit[5418]: USER_START pid=5418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.635379 kernel: audit: type=1105 audit(1707766847.607:1496): pid=5418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.635457 kernel: audit: type=1103 audit(1707766847.633:1497): pid=5420 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.633000 audit[5420]: CRED_ACQ pid=5420 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.932866 sshd[5418]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:47.932000 audit[5418]: USER_END pid=5418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.932000 audit[5418]: CRED_DISP pid=5418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.959597 systemd[1]: sshd@13-10.200.20.13:22-10.200.12.6:43960.service: Deactivated successfully. Feb 12 19:40:47.960430 systemd[1]: session-16.scope: Deactivated successfully. Feb 12 19:40:47.980217 kernel: audit: type=1106 audit(1707766847.932:1498): pid=5418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.980333 kernel: audit: type=1104 audit(1707766847.932:1499): pid=5418 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:47.981120 systemd-logind[1365]: Session 16 logged out. Waiting for processes to exit. Feb 12 19:40:47.958000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.20.13:22-10.200.12.6:43960 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:47.982184 systemd-logind[1365]: Removed session 16. Feb 12 19:40:49.214000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:49.214000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40147f67e0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:40:49.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:40:49.214000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:49.214000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=4014772ea0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:40:49.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:40:49.214000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:49.214000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400f015420 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:40:49.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:40:49.214000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:49.214000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=40147f6810 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:40:49.214000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:40:49.280000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:49.280000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=6f a1=400f0298c0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:40:49.280000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:40:49.405000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:49.405000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=72 a1=40149c4f60 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:40:49.405000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:40:50.370000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:50.370000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002a5d8c0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:40:50.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:50.370000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:50.370000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40026fee70 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:40:50.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:53.010748 systemd[1]: Started sshd@14-10.200.20.13:22-10.200.12.6:43970.service. Feb 12 19:40:53.009000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.13:22-10.200.12.6:43970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:53.015837 kernel: kauditd_printk_skb: 25 callbacks suppressed Feb 12 19:40:53.015927 kernel: audit: type=1130 audit(1707766853.009:1509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.13:22-10.200.12.6:43970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:53.455000 audit[5433]: USER_ACCT pid=5433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.457740 sshd[5433]: Accepted publickey for core from 10.200.12.6 port 43970 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:53.459565 sshd[5433]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:53.457000 audit[5433]: CRED_ACQ pid=5433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.502709 kernel: audit: type=1101 audit(1707766853.455:1510): pid=5433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.502840 kernel: audit: type=1103 audit(1707766853.457:1511): pid=5433 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.507142 systemd-logind[1365]: New session 17 of user core. Feb 12 19:40:53.507981 systemd[1]: Started session-17.scope. Feb 12 19:40:53.525236 kernel: audit: type=1006 audit(1707766853.457:1512): pid=5433 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Feb 12 19:40:53.457000 audit[5433]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd22b9190 a2=3 a3=1 items=0 ppid=1 pid=5433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.549425 kernel: audit: type=1300 audit(1707766853.457:1512): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd22b9190 a2=3 a3=1 items=0 ppid=1 pid=5433 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:53.551398 kernel: audit: type=1327 audit(1707766853.457:1512): proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:53.457000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:53.548000 audit[5433]: USER_START pid=5433 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.585149 kernel: audit: type=1105 audit(1707766853.548:1513): pid=5433 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.557000 audit[5435]: CRED_ACQ pid=5435 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.606356 kernel: audit: type=1103 audit(1707766853.557:1514): pid=5435 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.908004 sshd[5433]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:53.907000 audit[5433]: USER_END pid=5433 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.908000 audit[5433]: CRED_DISP pid=5433 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.935405 systemd[1]: sshd@14-10.200.20.13:22-10.200.12.6:43970.service: Deactivated successfully. Feb 12 19:40:53.936285 systemd[1]: session-17.scope: Deactivated successfully. Feb 12 19:40:53.956011 kernel: audit: type=1106 audit(1707766853.907:1515): pid=5433 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.956147 kernel: audit: type=1104 audit(1707766853.908:1516): pid=5433 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:53.933000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.20.13:22-10.200.12.6:43970 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:53.956876 systemd-logind[1365]: Session 17 logged out. Waiting for processes to exit. Feb 12 19:40:53.957723 systemd-logind[1365]: Removed session 17. Feb 12 19:40:57.694000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:57.694000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ade7c0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:40:57.694000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:57.695000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:57.695000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=4002ade7e0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:40:57.695000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:57.695000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:57.695000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029075a0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:40:57.695000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:57.696000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:40:57.696000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40029076c0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:40:57.696000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:40:57.876746 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.k08bJo.mount: Deactivated successfully. Feb 12 19:40:58.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.13:22-10.200.12.6:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:58.983971 systemd[1]: Started sshd@15-10.200.20.13:22-10.200.12.6:38818.service. Feb 12 19:40:58.989086 kernel: kauditd_printk_skb: 13 callbacks suppressed Feb 12 19:40:58.989185 kernel: audit: type=1130 audit(1707766858.982:1522): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.13:22-10.200.12.6:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.430000 audit[5463]: USER_ACCT pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.432785 sshd[5463]: Accepted publickey for core from 10.200.12.6 port 38818 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:40:59.434591 sshd[5463]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:40:59.432000 audit[5463]: CRED_ACQ pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.478134 kernel: audit: type=1101 audit(1707766859.430:1523): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.478247 kernel: audit: type=1103 audit(1707766859.432:1524): pid=5463 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.491811 kernel: audit: type=1006 audit(1707766859.432:1525): pid=5463 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Feb 12 19:40:59.432000 audit[5463]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde210130 a2=3 a3=1 items=0 ppid=1 pid=5463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.515796 kernel: audit: type=1300 audit(1707766859.432:1525): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffde210130 a2=3 a3=1 items=0 ppid=1 pid=5463 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:40:59.432000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:59.523809 kernel: audit: type=1327 audit(1707766859.432:1525): proctitle=737368643A20636F7265205B707269765D Feb 12 19:40:59.526957 systemd[1]: Started session-18.scope. Feb 12 19:40:59.528143 systemd-logind[1365]: New session 18 of user core. Feb 12 19:40:59.530000 audit[5463]: USER_START pid=5463 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.532000 audit[5465]: CRED_ACQ pid=5465 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.578282 kernel: audit: type=1105 audit(1707766859.530:1526): pid=5463 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.578402 kernel: audit: type=1103 audit(1707766859.532:1527): pid=5465 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.855747 sshd[5463]: pam_unix(sshd:session): session closed for user core Feb 12 19:40:59.855000 audit[5463]: USER_END pid=5463 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.859534 systemd[1]: session-18.scope: Deactivated successfully. Feb 12 19:40:59.860380 systemd[1]: sshd@15-10.200.20.13:22-10.200.12.6:38818.service: Deactivated successfully. Feb 12 19:40:59.883588 systemd-logind[1365]: Session 18 logged out. Waiting for processes to exit. Feb 12 19:40:59.884358 systemd-logind[1365]: Removed session 18. Feb 12 19:40:59.855000 audit[5463]: CRED_DISP pid=5463 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.907100 kernel: audit: type=1106 audit(1707766859.855:1528): pid=5463 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.907230 kernel: audit: type=1104 audit(1707766859.855:1529): pid=5463 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:40:59.855000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.20.13:22-10.200.12.6:38818 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:40:59.926862 systemd[1]: Started sshd@16-10.200.20.13:22-10.200.12.6:38826.service. Feb 12 19:40:59.925000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.13:22-10.200.12.6:38826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:00.343000 audit[5475]: USER_ACCT pid=5475 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:00.345459 sshd[5475]: Accepted publickey for core from 10.200.12.6 port 38826 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:00.345000 audit[5475]: CRED_ACQ pid=5475 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:00.345000 audit[5475]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffffe97b4d0 a2=3 a3=1 items=0 ppid=1 pid=5475 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:00.345000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:00.347094 sshd[5475]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:00.351524 systemd[1]: Started session-19.scope. Feb 12 19:41:00.351877 systemd-logind[1365]: New session 19 of user core. Feb 12 19:41:00.354000 audit[5475]: USER_START pid=5475 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:00.355000 audit[5477]: CRED_ACQ pid=5477 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:00.820595 sshd[5475]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:00.819000 audit[5475]: USER_END pid=5475 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:00.820000 audit[5475]: CRED_DISP pid=5475 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:00.823426 systemd[1]: sshd@16-10.200.20.13:22-10.200.12.6:38826.service: Deactivated successfully. Feb 12 19:41:00.821000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.20.13:22-10.200.12.6:38826 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:00.824265 systemd[1]: session-19.scope: Deactivated successfully. Feb 12 19:41:00.824901 systemd-logind[1365]: Session 19 logged out. Waiting for processes to exit. Feb 12 19:41:00.825900 systemd-logind[1365]: Removed session 19. Feb 12 19:41:00.891803 systemd[1]: Started sshd@17-10.200.20.13:22-10.200.12.6:38830.service. Feb 12 19:41:00.890000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.13:22-10.200.12.6:38830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:01.312000 audit[5484]: USER_ACCT pid=5484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:01.314222 sshd[5484]: Accepted publickey for core from 10.200.12.6 port 38830 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:01.313000 audit[5484]: CRED_ACQ pid=5484 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:01.313000 audit[5484]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffc3b9af90 a2=3 a3=1 items=0 ppid=1 pid=5484 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:01.313000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:01.315897 sshd[5484]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:01.319660 systemd-logind[1365]: New session 20 of user core. Feb 12 19:41:01.320240 systemd[1]: Started session-20.scope. Feb 12 19:41:01.322000 audit[5484]: USER_START pid=5484 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:01.324000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:02.462000 audit[5497]: NETFILTER_CFG table=filter:126 family=2 entries=20 op=nft_register_rule pid=5497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.462000 audit[5497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffd0cf2560 a2=0 a3=ffffbbcef6c0 items=0 ppid=2675 pid=5497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.462000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.463000 audit[5497]: NETFILTER_CFG table=nat:127 family=2 entries=22 op=nft_register_rule pid=5497 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.463000 audit[5497]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffd0cf2560 a2=0 a3=ffffbbcef6c0 items=0 ppid=2675 pid=5497 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.463000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.472000 audit[5499]: NETFILTER_CFG table=filter:128 family=2 entries=32 op=nft_register_rule pid=5499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.472000 audit[5499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=11292 a0=3 a1=ffffc4bcb1a0 a2=0 a3=ffffa63646c0 items=0 ppid=2675 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.472000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.473000 audit[5499]: NETFILTER_CFG table=nat:129 family=2 entries=22 op=nft_register_rule pid=5499 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:02.473000 audit[5499]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=6212 a0=3 a1=ffffc4bcb1a0 a2=0 a3=ffffa63646c0 items=0 ppid=2675 pid=5499 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:02.473000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:02.525772 sshd[5484]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:02.525000 audit[5484]: USER_END pid=5484 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:02.525000 audit[5484]: CRED_DISP pid=5484 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:02.528238 systemd[1]: session-20.scope: Deactivated successfully. Feb 12 19:41:02.527000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.20.13:22-10.200.12.6:38830 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:02.528918 systemd-logind[1365]: Session 20 logged out. Waiting for processes to exit. Feb 12 19:41:02.529036 systemd[1]: sshd@17-10.200.20.13:22-10.200.12.6:38830.service: Deactivated successfully. Feb 12 19:41:02.530279 systemd-logind[1365]: Removed session 20. Feb 12 19:41:02.599170 systemd[1]: Started sshd@18-10.200.20.13:22-10.200.12.6:38838.service. Feb 12 19:41:02.597000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.13:22-10.200.12.6:38838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:03.022000 audit[5502]: USER_ACCT pid=5502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:03.024105 sshd[5502]: Accepted publickey for core from 10.200.12.6 port 38838 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:03.023000 audit[5502]: CRED_ACQ pid=5502 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:03.023000 audit[5502]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffd22fa0f0 a2=3 a3=1 items=0 ppid=1 pid=5502 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:03.023000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:03.026004 sshd[5502]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:03.030586 systemd-logind[1365]: New session 21 of user core. Feb 12 19:41:03.031105 systemd[1]: Started session-21.scope. Feb 12 19:41:03.034000 audit[5502]: USER_START pid=5502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:03.035000 audit[5504]: CRED_ACQ pid=5504 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:03.600496 sshd[5502]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:03.600000 audit[5502]: USER_END pid=5502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:03.600000 audit[5502]: CRED_DISP pid=5502 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:03.603278 systemd[1]: sshd@18-10.200.20.13:22-10.200.12.6:38838.service: Deactivated successfully. Feb 12 19:41:03.601000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.20.13:22-10.200.12.6:38838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:03.604102 systemd[1]: session-21.scope: Deactivated successfully. Feb 12 19:41:03.604644 systemd-logind[1365]: Session 21 logged out. Waiting for processes to exit. Feb 12 19:41:03.605394 systemd-logind[1365]: Removed session 21. Feb 12 19:41:03.675296 systemd[1]: Started sshd@19-10.200.20.13:22-10.200.12.6:38846.service. Feb 12 19:41:03.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.13:22-10.200.12.6:38846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:04.118000 audit[5513]: USER_ACCT pid=5513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.122295 sshd[5513]: Accepted publickey for core from 10.200.12.6 port 38846 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:04.124064 sshd[5513]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:04.125041 kernel: kauditd_printk_skb: 47 callbacks suppressed Feb 12 19:41:04.125126 kernel: audit: type=1101 audit(1707766864.118:1563): pid=5513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.118000 audit[5513]: CRED_ACQ pid=5513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.169301 kernel: audit: type=1103 audit(1707766864.118:1564): pid=5513 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.169434 kernel: audit: type=1006 audit(1707766864.118:1565): pid=5513 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=22 res=1 Feb 12 19:41:04.118000 audit[5513]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd6ecc90 a2=3 a3=1 items=0 ppid=1 pid=5513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.186612 systemd[1]: Started session-22.scope. Feb 12 19:41:04.188072 systemd-logind[1365]: New session 22 of user core. Feb 12 19:41:04.206826 kernel: audit: type=1300 audit(1707766864.118:1565): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffdd6ecc90 a2=3 a3=1 items=0 ppid=1 pid=5513 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:04.210274 kernel: audit: type=1327 audit(1707766864.118:1565): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:04.118000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:04.214835 kernel: audit: type=1105 audit(1707766864.205:1566): pid=5513 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.205000 audit[5513]: USER_START pid=5513 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.205000 audit[5515]: CRED_ACQ pid=5515 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.263022 kernel: audit: type=1103 audit(1707766864.205:1567): pid=5515 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.527479 sshd[5513]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:04.527000 audit[5513]: USER_END pid=5513 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.531244 systemd-logind[1365]: Session 22 logged out. Waiting for processes to exit. Feb 12 19:41:04.532527 systemd[1]: session-22.scope: Deactivated successfully. Feb 12 19:41:04.533614 systemd-logind[1365]: Removed session 22. Feb 12 19:41:04.534266 systemd[1]: sshd@19-10.200.20.13:22-10.200.12.6:38846.service: Deactivated successfully. Feb 12 19:41:04.527000 audit[5513]: CRED_DISP pid=5513 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.575822 kernel: audit: type=1106 audit(1707766864.527:1568): pid=5513 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.575992 kernel: audit: type=1104 audit(1707766864.527:1569): pid=5513 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:04.532000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.13:22-10.200.12.6:38846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:04.596573 kernel: audit: type=1131 audit(1707766864.532:1570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.20.13:22-10.200.12.6:38846 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.601137 systemd[1]: Started sshd@20-10.200.20.13:22-10.200.12.6:53698.service. Feb 12 19:41:09.600000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.13:22-10.200.12.6:53698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:09.623747 kernel: audit: type=1130 audit(1707766869.600:1571): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.13:22-10.200.12.6:53698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:10.019000 audit[5549]: USER_ACCT pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.020621 sshd[5549]: Accepted publickey for core from 10.200.12.6 port 53698 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:10.022437 sshd[5549]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:10.027141 systemd[1]: Started session-23.scope. Feb 12 19:41:10.028438 systemd-logind[1365]: New session 23 of user core. Feb 12 19:41:10.021000 audit[5549]: CRED_ACQ pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.067525 kernel: audit: type=1101 audit(1707766870.019:1572): pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.067643 kernel: audit: type=1103 audit(1707766870.021:1573): pid=5549 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.081906 kernel: audit: type=1006 audit(1707766870.021:1574): pid=5549 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Feb 12 19:41:10.021000 audit[5549]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfcde2b0 a2=3 a3=1 items=0 ppid=1 pid=5549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:10.105295 kernel: audit: type=1300 audit(1707766870.021:1574): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffcfcde2b0 a2=3 a3=1 items=0 ppid=1 pid=5549 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:10.021000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:10.113499 kernel: audit: type=1327 audit(1707766870.021:1574): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:10.113578 kernel: audit: type=1105 audit(1707766870.046:1575): pid=5549 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.046000 audit[5549]: USER_START pid=5549 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.049000 audit[5593]: CRED_ACQ pid=5593 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.159102 kernel: audit: type=1103 audit(1707766870.049:1576): pid=5593 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.354000 audit[5603]: NETFILTER_CFG table=filter:130 family=2 entries=20 op=nft_register_rule pid=5603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:10.354000 audit[5603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd8cdf440 a2=0 a3=ffffa8ca06c0 items=0 ppid=2675 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:10.396632 kernel: audit: type=1325 audit(1707766870.354:1577): table=filter:130 family=2 entries=20 op=nft_register_rule pid=5603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:10.396777 kernel: audit: type=1300 audit(1707766870.354:1577): arch=c00000b7 syscall=211 success=yes exit=2844 a0=3 a1=ffffd8cdf440 a2=0 a3=ffffa8ca06c0 items=0 ppid=2675 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:10.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:10.354000 audit[5603]: NETFILTER_CFG table=nat:131 family=2 entries=106 op=nft_register_chain pid=5603 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Feb 12 19:41:10.354000 audit[5603]: SYSCALL arch=c00000b7 syscall=211 success=yes exit=48164 a0=3 a1=ffffd8cdf440 a2=0 a3=ffffa8ca06c0 items=0 ppid=2675 pid=5603 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:10.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Feb 12 19:41:10.408442 sshd[5549]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:10.408000 audit[5549]: USER_END pid=5549 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.408000 audit[5549]: CRED_DISP pid=5549 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:10.410845 systemd-logind[1365]: Session 23 logged out. Waiting for processes to exit. Feb 12 19:41:10.411916 systemd[1]: session-23.scope: Deactivated successfully. Feb 12 19:41:10.413066 systemd-logind[1365]: Removed session 23. Feb 12 19:41:10.413616 systemd[1]: sshd@20-10.200.20.13:22-10.200.12.6:53698.service: Deactivated successfully. Feb 12 19:41:10.413000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.20.13:22-10.200.12.6:53698 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:14.603000 audit[4937]: AVC avc: denied { watch } for pid=4937 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.1282445933/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c832,c916 tclass=file permissive=0 Feb 12 19:41:14.683959 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:41:14.684035 kernel: audit: type=1400 audit(1707766874.603:1582): avc: denied { watch } for pid=4937 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.1282445933/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c832,c916 tclass=file permissive=0 Feb 12 19:41:14.684112 kernel: audit: type=1300 audit(1707766874.603:1582): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001cb3a20 a2=fc6 a3=0 items=0 ppid=4819 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 key=(null) Feb 12 19:41:14.684133 kernel: audit: type=1327 audit(1707766874.603:1582): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:41:14.603000 audit[4937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001cb3a20 a2=fc6 a3=0 items=0 ppid=4819 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 key=(null) Feb 12 19:41:14.603000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:41:15.395000 audit[4975]: AVC avc: denied { watch } for pid=4975 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.3732306417/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c583,c643 tclass=file permissive=0 Feb 12 19:41:15.395000 audit[4975]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001add5a0 a2=fc6 a3=0 items=0 ppid=4873 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 key=(null) Feb 12 19:41:15.447690 kernel: audit: type=1400 audit(1707766875.395:1583): avc: denied { watch } for pid=4975 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.3732306417/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c583,c643 tclass=file permissive=0 Feb 12 19:41:15.447863 kernel: audit: type=1300 audit(1707766875.395:1583): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001add5a0 a2=fc6 a3=0 items=0 ppid=4873 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 key=(null) Feb 12 19:41:15.447896 kernel: audit: type=1327 audit(1707766875.395:1583): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:41:15.395000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:41:15.480000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.13:22-10.200.12.6:53700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:15.480720 systemd[1]: Started sshd@21-10.200.20.13:22-10.200.12.6:53700.service. Feb 12 19:41:15.502702 kernel: audit: type=1130 audit(1707766875.480:1584): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.13:22-10.200.12.6:53700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:15.895000 audit[5609]: USER_ACCT pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:15.896244 sshd[5609]: Accepted publickey for core from 10.200.12.6 port 53700 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:15.920728 kernel: audit: type=1101 audit(1707766875.895:1585): pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:15.920837 kernel: audit: type=1103 audit(1707766875.919:1586): pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:15.919000 audit[5609]: CRED_ACQ pid=5609 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:15.921352 sshd[5609]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:15.956152 kernel: audit: type=1006 audit(1707766875.919:1587): pid=5609 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Feb 12 19:41:15.919000 audit[5609]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff873a610 a2=3 a3=1 items=0 ppid=1 pid=5609 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:15.919000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:15.959932 systemd-logind[1365]: New session 24 of user core. Feb 12 19:41:15.961648 systemd[1]: Started session-24.scope. Feb 12 19:41:15.965000 audit[5609]: USER_START pid=5609 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:15.966000 audit[5611]: CRED_ACQ pid=5611 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:16.293875 sshd[5609]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:16.294000 audit[5609]: USER_END pid=5609 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:16.294000 audit[5609]: CRED_DISP pid=5609 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:16.297010 systemd[1]: sshd@21-10.200.20.13:22-10.200.12.6:53700.service: Deactivated successfully. Feb 12 19:41:16.296000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.20.13:22-10.200.12.6:53700 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:16.297710 systemd-logind[1365]: Session 24 logged out. Waiting for processes to exit. Feb 12 19:41:16.297810 systemd[1]: session-24.scope: Deactivated successfully. Feb 12 19:41:16.298777 systemd-logind[1365]: Removed session 24. Feb 12 19:41:21.401248 kernel: kauditd_printk_skb: 7 callbacks suppressed Feb 12 19:41:21.401370 kernel: audit: type=1130 audit(1707766881.372:1593): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.13:22-10.200.12.6:54838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:21.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.13:22-10.200.12.6:54838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:21.372935 systemd[1]: Started sshd@22-10.200.20.13:22-10.200.12.6:54838.service. Feb 12 19:41:21.819133 sshd[5621]: Accepted publickey for core from 10.200.12.6 port 54838 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:21.818000 audit[5621]: USER_ACCT pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:21.821146 sshd[5621]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:21.820000 audit[5621]: CRED_ACQ pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:21.865325 kernel: audit: type=1101 audit(1707766881.818:1594): pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:21.865405 kernel: audit: type=1103 audit(1707766881.820:1595): pid=5621 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:21.879536 kernel: audit: type=1006 audit(1707766881.820:1596): pid=5621 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Feb 12 19:41:21.820000 audit[5621]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe04a24e0 a2=3 a3=1 items=0 ppid=1 pid=5621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.903177 kernel: audit: type=1300 audit(1707766881.820:1596): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=ffffe04a24e0 a2=3 a3=1 items=0 ppid=1 pid=5621 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:21.820000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:21.911603 kernel: audit: type=1327 audit(1707766881.820:1596): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:21.914295 systemd[1]: Started session-25.scope. Feb 12 19:41:21.914587 systemd-logind[1365]: New session 25 of user core. Feb 12 19:41:21.918000 audit[5621]: USER_START pid=5621 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:21.919000 audit[5625]: CRED_ACQ pid=5625 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:21.969835 kernel: audit: type=1105 audit(1707766881.918:1597): pid=5621 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:21.969939 kernel: audit: type=1103 audit(1707766881.919:1598): pid=5625 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:22.244850 sshd[5621]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:22.245000 audit[5621]: USER_END pid=5621 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:22.273320 systemd[1]: sshd@22-10.200.20.13:22-10.200.12.6:54838.service: Deactivated successfully. Feb 12 19:41:22.245000 audit[5621]: CRED_DISP pid=5621 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:22.294763 kernel: audit: type=1106 audit(1707766882.245:1599): pid=5621 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:22.294868 kernel: audit: type=1104 audit(1707766882.245:1600): pid=5621 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:22.274156 systemd[1]: session-25.scope: Deactivated successfully. Feb 12 19:41:22.295071 systemd-logind[1365]: Session 25 logged out. Waiting for processes to exit. Feb 12 19:41:22.272000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.20.13:22-10.200.12.6:54838 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:22.296219 systemd-logind[1365]: Removed session 25. Feb 12 19:41:27.341871 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:41:27.342029 kernel: audit: type=1130 audit(1707766887.315:1602): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.13:22-10.200.12.6:59620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:27.315000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.13:22-10.200.12.6:59620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:27.315756 systemd[1]: Started sshd@23-10.200.20.13:22-10.200.12.6:59620.service. Feb 12 19:41:27.730000 audit[5641]: USER_ACCT pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:27.731859 sshd[5641]: Accepted publickey for core from 10.200.12.6 port 59620 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:27.733656 sshd[5641]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:27.732000 audit[5641]: CRED_ACQ pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:27.778059 kernel: audit: type=1101 audit(1707766887.730:1603): pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:27.778207 kernel: audit: type=1103 audit(1707766887.732:1604): pid=5641 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:27.781270 systemd[1]: Started session-26.scope. Feb 12 19:41:27.782653 systemd-logind[1365]: New session 26 of user core. Feb 12 19:41:27.792606 kernel: audit: type=1006 audit(1707766887.732:1605): pid=5641 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Feb 12 19:41:27.732000 audit[5641]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff76040e0 a2=3 a3=1 items=0 ppid=1 pid=5641 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:27.816981 kernel: audit: type=1300 audit(1707766887.732:1605): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff76040e0 a2=3 a3=1 items=0 ppid=1 pid=5641 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:27.732000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:27.825218 kernel: audit: type=1327 audit(1707766887.732:1605): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:27.825314 kernel: audit: type=1105 audit(1707766887.787:1606): pid=5641 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:27.787000 audit[5641]: USER_START pid=5641 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:27.788000 audit[5643]: CRED_ACQ pid=5643 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:27.875920 kernel: audit: type=1103 audit(1707766887.788:1607): pid=5643 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:27.881631 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.LuoMa5.mount: Deactivated successfully. Feb 12 19:41:28.107421 sshd[5641]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:28.108000 audit[5641]: USER_END pid=5641 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:28.108000 audit[5641]: CRED_DISP pid=5641 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:28.136267 systemd[1]: sshd@23-10.200.20.13:22-10.200.12.6:59620.service: Deactivated successfully. Feb 12 19:41:28.137098 systemd[1]: session-26.scope: Deactivated successfully. Feb 12 19:41:28.157616 kernel: audit: type=1106 audit(1707766888.108:1608): pid=5641 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:28.157733 kernel: audit: type=1104 audit(1707766888.108:1609): pid=5641 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:28.158521 systemd-logind[1365]: Session 26 logged out. Waiting for processes to exit. Feb 12 19:41:28.135000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.20.13:22-10.200.12.6:59620 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:28.159948 systemd-logind[1365]: Removed session 26. Feb 12 19:41:33.202736 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:41:33.202865 kernel: audit: type=1130 audit(1707766893.176:1611): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.13:22-10.200.12.6:59624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:33.176000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.13:22-10.200.12.6:59624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:33.177283 systemd[1]: Started sshd@24-10.200.20.13:22-10.200.12.6:59624.service. Feb 12 19:41:33.591000 audit[5673]: USER_ACCT pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.593892 sshd[5673]: Accepted publickey for core from 10.200.12.6 port 59624 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:33.601167 sshd[5673]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:33.600000 audit[5673]: CRED_ACQ pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.637050 kernel: audit: type=1101 audit(1707766893.591:1612): pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.637178 kernel: audit: type=1103 audit(1707766893.600:1613): pid=5673 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.600000 audit[5673]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff555ccb0 a2=3 a3=1 items=0 ppid=1 pid=5673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:33.656233 systemd-logind[1365]: New session 27 of user core. Feb 12 19:41:33.656858 systemd[1]: Started session-27.scope. Feb 12 19:41:33.676246 kernel: audit: type=1006 audit(1707766893.600:1614): pid=5673 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Feb 12 19:41:33.676969 kernel: audit: type=1300 audit(1707766893.600:1614): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff555ccb0 a2=3 a3=1 items=0 ppid=1 pid=5673 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:33.600000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:33.684850 kernel: audit: type=1327 audit(1707766893.600:1614): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:33.684974 kernel: audit: type=1105 audit(1707766893.661:1615): pid=5673 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.661000 audit[5673]: USER_START pid=5673 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.663000 audit[5675]: CRED_ACQ pid=5675 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.730268 kernel: audit: type=1103 audit(1707766893.663:1616): pid=5675 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.976724 sshd[5673]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:33.976000 audit[5673]: USER_END pid=5673 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.980034 systemd[1]: session-27.scope: Deactivated successfully. Feb 12 19:41:33.980772 systemd[1]: sshd@24-10.200.20.13:22-10.200.12.6:59624.service: Deactivated successfully. Feb 12 19:41:33.977000 audit[5673]: CRED_DISP pid=5673 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:34.024272 kernel: audit: type=1106 audit(1707766893.976:1617): pid=5673 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:34.024364 kernel: audit: type=1104 audit(1707766893.977:1618): pid=5673 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:33.977000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.20.13:22-10.200.12.6:59624 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:34.024471 systemd-logind[1365]: Session 27 logged out. Waiting for processes to exit. Feb 12 19:41:34.025308 systemd-logind[1365]: Removed session 27. Feb 12 19:41:34.648578 systemd[1]: run-containerd-runc-k8s.io-e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0-runc.pzwLxz.mount: Deactivated successfully. Feb 12 19:41:39.046000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.13:22-10.200.12.6:44890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:39.047342 systemd[1]: Started sshd@25-10.200.20.13:22-10.200.12.6:44890.service. Feb 12 19:41:39.052938 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:41:39.053048 kernel: audit: type=1130 audit(1707766899.046:1620): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.13:22-10.200.12.6:44890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:39.431066 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.5uJH2C.mount: Deactivated successfully. Feb 12 19:41:39.461000 audit[5707]: USER_ACCT pid=5707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.463865 sshd[5707]: Accepted publickey for core from 10.200.12.6 port 44890 ssh2: RSA SHA256:/GC//G+FwBgDRBLcr4tZBksqHch3CtpA6Spv2+8GrTw Feb 12 19:41:39.466630 sshd[5707]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Feb 12 19:41:39.465000 audit[5707]: CRED_ACQ pid=5707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.512625 kernel: audit: type=1101 audit(1707766899.461:1621): pid=5707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.512747 kernel: audit: type=1103 audit(1707766899.465:1622): pid=5707 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.528409 kernel: audit: type=1006 audit(1707766899.465:1623): pid=5707 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Feb 12 19:41:39.527341 systemd[1]: Started session-28.scope. Feb 12 19:41:39.527642 systemd-logind[1365]: New session 28 of user core. Feb 12 19:41:39.465000 audit[5707]: SYSCALL arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0ece440 a2=3 a3=1 items=0 ppid=1 pid=5707 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:39.553946 kernel: audit: type=1300 audit(1707766899.465:1623): arch=c00000b7 syscall=64 success=yes exit=3 a0=5 a1=fffff0ece440 a2=3 a3=1 items=0 ppid=1 pid=5707 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:41:39.465000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:39.562206 kernel: audit: type=1327 audit(1707766899.465:1623): proctitle=737368643A20636F7265205B707269765D Feb 12 19:41:39.562000 audit[5707]: USER_START pid=5707 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.589116 kernel: audit: type=1105 audit(1707766899.562:1624): pid=5707 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.589318 kernel: audit: type=1103 audit(1707766899.563:1625): pid=5730 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.563000 audit[5730]: CRED_ACQ pid=5730 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.741798 systemd[1]: run-containerd-runc-k8s.io-232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34-runc.WHsaA7.mount: Deactivated successfully. Feb 12 19:41:39.893442 sshd[5707]: pam_unix(sshd:session): session closed for user core Feb 12 19:41:39.893000 audit[5707]: USER_END pid=5707 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.893000 audit[5707]: CRED_DISP pid=5707 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.921752 systemd[1]: sshd@25-10.200.20.13:22-10.200.12.6:44890.service: Deactivated successfully. Feb 12 19:41:39.922585 systemd[1]: session-28.scope: Deactivated successfully. Feb 12 19:41:39.924123 systemd-logind[1365]: Session 28 logged out. Waiting for processes to exit. Feb 12 19:41:39.925025 systemd-logind[1365]: Removed session 28. Feb 12 19:41:39.943121 kernel: audit: type=1106 audit(1707766899.893:1626): pid=5707 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.943241 kernel: audit: type=1104 audit(1707766899.893:1627): pid=5707 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.12.6 addr=10.200.12.6 terminal=ssh res=success' Feb 12 19:41:39.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.20.13:22-10.200.12.6:44890 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Feb 12 19:41:49.216000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.221521 kernel: kauditd_printk_skb: 1 callbacks suppressed Feb 12 19:41:49.221622 kernel: audit: type=1400 audit(1707766909.216:1629): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.216000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.268256 kernel: audit: type=1400 audit(1707766909.216:1630): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.216000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4006ff0fc0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:41:49.295470 kernel: audit: type=1300 audit(1707766909.216:1630): arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4006ff0fc0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:41:49.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:41:49.320114 kernel: audit: type=1327 audit(1707766909.216:1630): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:41:49.216000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.344009 kernel: audit: type=1400 audit(1707766909.216:1631): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.344121 kernel: audit: type=1300 audit(1707766909.216:1631): arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4006ff1020 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:41:49.216000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4006ff1020 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:41:49.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:41:49.396177 kernel: audit: type=1327 audit(1707766909.216:1631): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:41:49.217000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.420112 kernel: audit: type=1400 audit(1707766909.217:1632): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.420279 kernel: audit: type=1300 audit(1707766909.217:1632): arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4007484820 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:41:49.217000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4007484820 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:41:49.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:41:49.471638 kernel: audit: type=1327 audit(1707766909.217:1632): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:41:49.216000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=71 a1=400726c6f0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:41:49.216000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:41:49.282000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.282000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4007485460 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:41:49.282000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:41:49.407000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:49.407000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=62 a1=4006ff1bf0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:41:49.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:41:50.370000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:50.370000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400225c7e0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:41:50.370000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:50.372000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:50.372000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=40010d3500 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:41:50.372000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:57.696000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:57.702523 kernel: kauditd_printk_skb: 14 callbacks suppressed Feb 12 19:41:57.702623 kernel: audit: type=1400 audit(1707766917.696:1638): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:57.696000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:57.745535 kernel: audit: type=1400 audit(1707766917.696:1637): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:57.745674 kernel: audit: type=1300 audit(1707766917.696:1638): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028fc360 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:41:57.696000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028fc360 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:41:57.696000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:57.797459 kernel: audit: type=1327 audit(1707766917.696:1638): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:57.697000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:57.818835 kernel: audit: type=1400 audit(1707766917.697:1639): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:57.818946 kernel: audit: type=1300 audit(1707766917.697:1639): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028fc380 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:41:57.697000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028fc380 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:41:57.697000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:57.871528 kernel: audit: type=1327 audit(1707766917.697:1639): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:57.698000 audit[2381]: AVC avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:57.892966 kernel: audit: type=1400 audit(1707766917.698:1640): avc: denied { watch } for pid=2381 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:41:57.698000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028fc6e0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:41:57.923654 kernel: audit: type=1300 audit(1707766917.698:1640): arch=c00000b7 syscall=27 success=no exit=-13 a0=b a1=40028fc6e0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:41:57.698000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:57.949135 kernel: audit: type=1327 audit(1707766917.698:1640): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:41:57.696000 audit[2381]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=a a1=400225cdc0 a2=fc6 a3=0 items=0 ppid=2222 pid=2381 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:41:57.696000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:42:04.646903 systemd[1]: run-containerd-runc-k8s.io-e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0-runc.F7LTJM.mount: Deactivated successfully. Feb 12 19:42:09.738182 systemd[1]: run-containerd-runc-k8s.io-232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34-runc.kfwfwD.mount: Deactivated successfully. Feb 12 19:42:09.761045 systemd[1]: run-containerd-runc-k8s.io-0f2af81650ae51cef8abc1f752deaecab923a7264d909b8460015b10f9a4a4ec-runc.XYzEot.mount: Deactivated successfully. Feb 12 19:42:14.605000 audit[4937]: AVC avc: denied { watch } for pid=4937 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.1282445933/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c832,c916 tclass=file permissive=0 Feb 12 19:42:14.610635 kernel: kauditd_printk_skb: 2 callbacks suppressed Feb 12 19:42:14.610734 kernel: audit: type=1400 audit(1707766934.605:1641): avc: denied { watch } for pid=4937 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.1282445933/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c832,c916 tclass=file permissive=0 Feb 12 19:42:14.605000 audit[4937]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001e11b40 a2=fc6 a3=0 items=0 ppid=4819 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 key=(null) Feb 12 19:42:14.662038 kernel: audit: type=1300 audit(1707766934.605:1641): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4001e11b40 a2=fc6 a3=0 items=0 ppid=4819 pid=4937 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c832,c916 key=(null) Feb 12 19:42:14.605000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:42:14.685734 kernel: audit: type=1327 audit(1707766934.605:1641): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:42:15.397000 audit[4975]: AVC avc: denied { watch } for pid=4975 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.3732306417/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c583,c643 tclass=file permissive=0 Feb 12 19:42:15.397000 audit[4975]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a045e0 a2=fc6 a3=0 items=0 ppid=4873 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 key=(null) Feb 12 19:42:15.449687 kernel: audit: type=1400 audit(1707766935.397:1642): avc: denied { watch } for pid=4975 comm="apiserver" path="/calico-apiserver-certs/..2024_02_12_19_39_09.3732306417/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c583,c643 tclass=file permissive=0 Feb 12 19:42:15.449820 kernel: audit: type=1300 audit(1707766935.397:1642): arch=c00000b7 syscall=27 success=no exit=-13 a0=8 a1=4000a045e0 a2=fc6 a3=0 items=0 ppid=4873 pid=4975 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c583,c643 key=(null) Feb 12 19:42:15.449854 kernel: audit: type=1327 audit(1707766935.397:1642): proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:42:15.397000 audit: PROCTITLE proctitle=2E2F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C Feb 12 19:42:27.879791 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.x0QswE.mount: Deactivated successfully. Feb 12 19:42:34.648391 systemd[1]: run-containerd-runc-k8s.io-e58b13a0f567a229b974df3c7abafb50755a5a05edc0d99fd3770e84c93d46a0-runc.dJx4CH.mount: Deactivated successfully. Feb 12 19:42:35.276054 systemd[1]: cri-containerd-09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47.scope: Deactivated successfully. Feb 12 19:42:35.276353 systemd[1]: cri-containerd-09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47.scope: Consumed 4.139s CPU time. Feb 12 19:42:35.281000 audit: BPF prog-id=87 op=UNLOAD Feb 12 19:42:35.281000 audit: BPF prog-id=98 op=UNLOAD Feb 12 19:42:35.296117 kernel: audit: type=1334 audit(1707766955.281:1643): prog-id=87 op=UNLOAD Feb 12 19:42:35.296241 kernel: audit: type=1334 audit(1707766955.281:1644): prog-id=98 op=UNLOAD Feb 12 19:42:35.307172 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47-rootfs.mount: Deactivated successfully. Feb 12 19:42:35.310644 env[1376]: time="2024-02-12T19:42:35.310593661Z" level=info msg="shim disconnected" id=09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47 Feb 12 19:42:35.311014 env[1376]: time="2024-02-12T19:42:35.310644780Z" level=warning msg="cleaning up after shim disconnected" id=09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47 namespace=k8s.io Feb 12 19:42:35.311014 env[1376]: time="2024-02-12T19:42:35.310656820Z" level=info msg="cleaning up dead shim" Feb 12 19:42:35.318227 env[1376]: time="2024-02-12T19:42:35.318185016Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:42:35Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5934 runtime=io.containerd.runc.v2\n" Feb 12 19:42:35.642966 kubelet[2501]: I0212 19:42:35.641904 2501 scope.go:117] "RemoveContainer" containerID="09a0308741b26bc19391753bec02eb01c573c5cddd3d37f2773da36aaa025c47" Feb 12 19:42:35.644676 env[1376]: time="2024-02-12T19:42:35.644629331Z" level=info msg="CreateContainer within sandbox \"d1b748c5e06931ed16e4c41367818f78ee5598afad6f09437080e839366a43b7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:1,}" Feb 12 19:42:35.670991 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1846933328.mount: Deactivated successfully. Feb 12 19:42:35.689725 env[1376]: time="2024-02-12T19:42:35.689640665Z" level=info msg="CreateContainer within sandbox \"d1b748c5e06931ed16e4c41367818f78ee5598afad6f09437080e839366a43b7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:1,} returns container id \"c649c3c844fec77afc1a2419da37ca557da1696ad73482d979b7ac2f8b23094b\"" Feb 12 19:42:35.690390 env[1376]: time="2024-02-12T19:42:35.690364381Z" level=info msg="StartContainer for \"c649c3c844fec77afc1a2419da37ca557da1696ad73482d979b7ac2f8b23094b\"" Feb 12 19:42:35.708856 systemd[1]: Started cri-containerd-c649c3c844fec77afc1a2419da37ca557da1696ad73482d979b7ac2f8b23094b.scope. Feb 12 19:42:35.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763876 kernel: audit: type=1400 audit(1707766955.726:1645): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763982 kernel: audit: type=1400 audit(1707766955.726:1646): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.783908 kernel: audit: type=1400 audit(1707766955.726:1647): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.802847 kernel: audit: type=1400 audit(1707766955.726:1648): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.821524 kernel: audit: type=1400 audit(1707766955.726:1649): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.840179 kernel: audit: type=1400 audit(1707766955.726:1650): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.860429 kernel: audit: type=1400 audit(1707766955.726:1651): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.726000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.879601 kernel: audit: type=1400 audit(1707766955.726:1652): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.744000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.744000 audit: BPF prog-id=202 op=LOAD Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2222 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343963336338343466656337376166633161323431396461333763 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2222 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343963336338343466656337376166633161323431396461333763 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit: BPF prog-id=203 op=LOAD Feb 12 19:42:35.763000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2222 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343963336338343466656337376166633161323431396461333763 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit: BPF prog-id=204 op=LOAD Feb 12 19:42:35.763000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2222 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343963336338343466656337376166633161323431396461333763 Feb 12 19:42:35.763000 audit: BPF prog-id=204 op=UNLOAD Feb 12 19:42:35.763000 audit: BPF prog-id=203 op=UNLOAD Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { perfmon } for pid=5955 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit[5955]: AVC avc: denied { bpf } for pid=5955 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:35.763000 audit: BPF prog-id=205 op=LOAD Feb 12 19:42:35.763000 audit[5955]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2222 pid=5955 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:35.763000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6336343963336338343466656337376166633161323431396461333763 Feb 12 19:42:35.897290 env[1376]: time="2024-02-12T19:42:35.895343932Z" level=info msg="StartContainer for \"c649c3c844fec77afc1a2419da37ca557da1696ad73482d979b7ac2f8b23094b\" returns successfully" Feb 12 19:42:36.069895 systemd[1]: cri-containerd-55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc.scope: Deactivated successfully. Feb 12 19:42:36.070214 systemd[1]: cri-containerd-55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc.scope: Consumed 5.317s CPU time. Feb 12 19:42:36.069000 audit: BPF prog-id=124 op=UNLOAD Feb 12 19:42:36.075000 audit: BPF prog-id=127 op=UNLOAD Feb 12 19:42:36.090618 env[1376]: time="2024-02-12T19:42:36.090568292Z" level=info msg="shim disconnected" id=55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc Feb 12 19:42:36.090618 env[1376]: time="2024-02-12T19:42:36.090617332Z" level=warning msg="cleaning up after shim disconnected" id=55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc namespace=k8s.io Feb 12 19:42:36.090792 env[1376]: time="2024-02-12T19:42:36.090626772Z" level=info msg="cleaning up dead shim" Feb 12 19:42:36.097521 env[1376]: time="2024-02-12T19:42:36.097469131Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:42:36Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5995 runtime=io.containerd.runc.v2\n" Feb 12 19:42:36.645060 kubelet[2501]: I0212 19:42:36.645028 2501 scope.go:117] "RemoveContainer" containerID="55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc" Feb 12 19:42:36.646786 env[1376]: time="2024-02-12T19:42:36.646748478Z" level=info msg="CreateContainer within sandbox \"d8cae7e7b4b4ec550cb59b64af6fb14605f71a3a1162ab773660a6c31a76aac8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:1,}" Feb 12 19:42:36.667365 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc-rootfs.mount: Deactivated successfully. Feb 12 19:42:36.687770 env[1376]: time="2024-02-12T19:42:36.687722832Z" level=info msg="CreateContainer within sandbox \"d8cae7e7b4b4ec550cb59b64af6fb14605f71a3a1162ab773660a6c31a76aac8\" for &ContainerMetadata{Name:tigera-operator,Attempt:1,} returns container id \"b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671\"" Feb 12 19:42:36.688645 env[1376]: time="2024-02-12T19:42:36.688611507Z" level=info msg="StartContainer for \"b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671\"" Feb 12 19:42:36.707337 systemd[1]: Started cri-containerd-b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671.scope. Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.739000 audit: BPF prog-id=206 op=LOAD Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=4000145b38 a2=10 a3=0 items=0 ppid=2581 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:36.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303363616331316664653962653162613930346365643164323764 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001455a0 a2=3c a3=0 items=0 ppid=2581 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:36.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303363616331316664653962653162613930346365643164323764 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit: BPF prog-id=207 op=LOAD Feb 12 19:42:36.740000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001458e0 a2=78 a3=0 items=0 ppid=2581 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:36.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303363616331316664653962653162613930346365643164323764 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit: BPF prog-id=208 op=LOAD Feb 12 19:42:36.740000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=4000145670 a2=78 a3=0 items=0 ppid=2581 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:36.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303363616331316664653962653162613930346365643164323764 Feb 12 19:42:36.740000 audit: BPF prog-id=208 op=UNLOAD Feb 12 19:42:36.740000 audit: BPF prog-id=207 op=UNLOAD Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { perfmon } for pid=6015 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit[6015]: AVC avc: denied { bpf } for pid=6015 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:36.740000 audit: BPF prog-id=209 op=LOAD Feb 12 19:42:36.740000 audit[6015]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=4000145b40 a2=78 a3=0 items=0 ppid=2581 pid=6015 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:36.740000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6233303363616331316664653962653162613930346365643164323764 Feb 12 19:42:36.760012 env[1376]: time="2024-02-12T19:42:36.759962399Z" level=info msg="StartContainer for \"b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671\" returns successfully" Feb 12 19:42:37.460000 audit[5966]: AVC avc: denied { watch } for pid=5966 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:37.460000 audit[5966]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=40003c47b0 a2=fc6 a3=0 items=0 ppid=2222 pid=5966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:42:37.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:42:37.460000 audit[5966]: AVC avc: denied { watch } for pid=5966 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:37.460000 audit[5966]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=7 a1=4000074640 a2=fc6 a3=0 items=0 ppid=2222 pid=5966 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c167,c337 key=(null) Feb 12 19:42:37.460000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Feb 12 19:42:37.651960 kubelet[2501]: E0212 19:42:37.651931 2501 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-04a5975e1d?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:42:37.667554 systemd[1]: run-containerd-runc-k8s.io-b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671-runc.AyxtAZ.mount: Deactivated successfully. Feb 12 19:42:37.897243 kubelet[2501]: E0212 19:42:37.897038 2501 event.go:280] Server rejected event '&v1.Event{TypeMeta:v1.TypeMeta{Kind:"", APIVersion:""}, ObjectMeta:v1.ObjectMeta{Name:"kube-apiserver-ci-3510.3.2-a-04a5975e1d.17b334fdb05f57ae", GenerateName:"", Namespace:"kube-system", SelfLink:"", UID:"", ResourceVersion:"", Generation:0, CreationTimestamp:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string(nil), Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, InvolvedObject:v1.ObjectReference{Kind:"Pod", Namespace:"kube-system", Name:"kube-apiserver-ci-3510.3.2-a-04a5975e1d", UID:"b749aca798785553045fd0f56302a003", APIVersion:"v1", ResourceVersion:"", FieldPath:"spec.containers{kube-apiserver}"}, Reason:"Unhealthy", Message:"Readiness probe failed: HTTP probe failed with statuscode: 500", Source:v1.EventSource{Component:"kubelet", Host:"ci-3510.3.2-a-04a5975e1d"}, FirstTimestamp:time.Date(2024, time.February, 12, 19, 42, 27, 893958574, time.Local), LastTimestamp:time.Date(2024, time.February, 12, 19, 42, 27, 893958574, time.Local), Count:1, Type:"Warning", EventTime:time.Date(1, time.January, 1, 0, 0, 0, 0, time.UTC), Series:(*v1.EventSeries)(nil), Action:"", Related:(*v1.ObjectReference)(nil), ReportingController:"kubelet", ReportingInstance:"ci-3510.3.2-a-04a5975e1d"}': 'rpc error: code = Unavailable desc = keepalive ping failed to receive ACK within timeout' (will not retry!) Feb 12 19:42:39.432893 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.74jTuN.mount: Deactivated successfully. Feb 12 19:42:39.740394 systemd[1]: run-containerd-runc-k8s.io-232ba37e137f7d446fee6d05d2d0a42f7256fc6fa1f33291625beaa35d01fc34-runc.5s2VMZ.mount: Deactivated successfully. Feb 12 19:42:41.258368 systemd[1]: cri-containerd-16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23.scope: Deactivated successfully. Feb 12 19:42:41.258715 systemd[1]: cri-containerd-16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23.scope: Consumed 2.918s CPU time. Feb 12 19:42:41.273714 kernel: kauditd_printk_skb: 114 callbacks suppressed Feb 12 19:42:41.273955 kernel: audit: type=1334 audit(1707766961.262:1685): prog-id=91 op=UNLOAD Feb 12 19:42:41.262000 audit: BPF prog-id=91 op=UNLOAD Feb 12 19:42:41.262000 audit: BPF prog-id=102 op=UNLOAD Feb 12 19:42:41.285587 kernel: audit: type=1334 audit(1707766961.262:1686): prog-id=102 op=UNLOAD Feb 12 19:42:41.298246 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23-rootfs.mount: Deactivated successfully. Feb 12 19:42:41.299308 env[1376]: time="2024-02-12T19:42:41.299257931Z" level=info msg="shim disconnected" id=16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23 Feb 12 19:42:41.299586 env[1376]: time="2024-02-12T19:42:41.299313451Z" level=warning msg="cleaning up after shim disconnected" id=16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23 namespace=k8s.io Feb 12 19:42:41.299586 env[1376]: time="2024-02-12T19:42:41.299323611Z" level=info msg="cleaning up dead shim" Feb 12 19:42:41.306914 env[1376]: time="2024-02-12T19:42:41.306867922Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:42:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6117 runtime=io.containerd.runc.v2\n" Feb 12 19:42:41.662909 kubelet[2501]: I0212 19:42:41.662815 2501 scope.go:117] "RemoveContainer" containerID="16518ba24af997336796546f2f092e55bf15b0028c4bcd02f9e93fee725a0d23" Feb 12 19:42:41.665441 env[1376]: time="2024-02-12T19:42:41.665397884Z" level=info msg="CreateContainer within sandbox \"1af38a8b2786d7ce79096d5e8f2d743c295c51b884dc18fe7084a125ed643d46\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:1,}" Feb 12 19:42:41.694113 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount140174992.mount: Deactivated successfully. Feb 12 19:42:41.712512 env[1376]: time="2024-02-12T19:42:41.712457460Z" level=info msg="CreateContainer within sandbox \"1af38a8b2786d7ce79096d5e8f2d743c295c51b884dc18fe7084a125ed643d46\" for &ContainerMetadata{Name:kube-scheduler,Attempt:1,} returns container id \"4b45831e55004a3a61161273ed8b5596fe29f18012658bd4fd79981a68533b83\"" Feb 12 19:42:41.713335 env[1376]: time="2024-02-12T19:42:41.713310534Z" level=info msg="StartContainer for \"4b45831e55004a3a61161273ed8b5596fe29f18012658bd4fd79981a68533b83\"" Feb 12 19:42:41.747943 systemd[1]: Started cri-containerd-4b45831e55004a3a61161273ed8b5596fe29f18012658bd4fd79981a68533b83.scope. Feb 12 19:42:41.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796461 kernel: audit: type=1400 audit(1707766961.760:1687): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796568 kernel: audit: type=1400 audit(1707766961.760:1688): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.818216 kernel: audit: type=1400 audit(1707766961.760:1689): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.837856 kernel: audit: type=1400 audit(1707766961.760:1690): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.855760 kernel: audit: type=1400 audit(1707766961.760:1691): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.873945 kernel: audit: type=1400 audit(1707766961.760:1692): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.892374 kernel: audit: type=1400 audit(1707766961.760:1693): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.760000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.893684 kernel: audit: type=1400 audit(1707766961.760:1694): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.760000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.778000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.778000 audit: BPF prog-id=210 op=LOAD Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=0 a0=f a1=40001bdb38 a2=10 a3=0 items=0 ppid=2240 pid=6137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:41.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462343538333165353530303461336136313136313237336564386235 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=0 a1=40001bd5a0 a2=3c a3=0 items=0 ppid=2240 pid=6137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:41.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462343538333165353530303461336136313136313237336564386235 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit: BPF prog-id=211 op=LOAD Feb 12 19:42:41.796000 audit[6137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bd8e0 a2=78 a3=0 items=0 ppid=2240 pid=6137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:41.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462343538333165353530303461336136313136313237336564386235 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit: BPF prog-id=212 op=LOAD Feb 12 19:42:41.796000 audit[6137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=18 a0=5 a1=40001bd670 a2=78 a3=0 items=0 ppid=2240 pid=6137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:41.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462343538333165353530303461336136313136313237336564386235 Feb 12 19:42:41.796000 audit: BPF prog-id=212 op=UNLOAD Feb 12 19:42:41.796000 audit: BPF prog-id=211 op=UNLOAD Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { perfmon } for pid=6137 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit[6137]: AVC avc: denied { bpf } for pid=6137 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Feb 12 19:42:41.796000 audit: BPF prog-id=213 op=LOAD Feb 12 19:42:41.796000 audit[6137]: SYSCALL arch=c00000b7 syscall=280 success=yes exit=16 a0=5 a1=40001bdb40 a2=78 a3=0 items=0 ppid=2240 pid=6137 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Feb 12 19:42:41.796000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462343538333165353530303461336136313136313237336564386235 Feb 12 19:42:41.925457 env[1376]: time="2024-02-12T19:42:41.925384203Z" level=info msg="StartContainer for \"4b45831e55004a3a61161273ed8b5596fe29f18012658bd4fd79981a68533b83\" returns successfully" Feb 12 19:42:42.691231 systemd[1]: run-containerd-runc-k8s.io-4b45831e55004a3a61161273ed8b5596fe29f18012658bd4fd79981a68533b83-runc.qUe8bu.mount: Deactivated successfully. Feb 12 19:42:42.750895 kubelet[2501]: E0212 19:42:42.750860 2501 controller.go:193] "Failed to update lease" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.13:34612->10.200.20.10:2379: read: connection timed out" Feb 12 19:42:43.328959 systemd[1]: cri-containerd-b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671.scope: Deactivated successfully. Feb 12 19:42:43.328000 audit: BPF prog-id=206 op=UNLOAD Feb 12 19:42:43.332000 audit: BPF prog-id=209 op=UNLOAD Feb 12 19:42:43.346733 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671-rootfs.mount: Deactivated successfully. Feb 12 19:42:43.369332 env[1376]: time="2024-02-12T19:42:43.369278314Z" level=info msg="shim disconnected" id=b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671 Feb 12 19:42:43.369848 env[1376]: time="2024-02-12T19:42:43.369817550Z" level=warning msg="cleaning up after shim disconnected" id=b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671 namespace=k8s.io Feb 12 19:42:43.369936 env[1376]: time="2024-02-12T19:42:43.369921950Z" level=info msg="cleaning up dead shim" Feb 12 19:42:43.376903 env[1376]: time="2024-02-12T19:42:43.376866824Z" level=warning msg="cleanup warnings time=\"2024-02-12T19:42:43Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=6179 runtime=io.containerd.runc.v2\n" Feb 12 19:42:43.669882 kubelet[2501]: I0212 19:42:43.669410 2501 scope.go:117] "RemoveContainer" containerID="55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc" Feb 12 19:42:43.670222 kubelet[2501]: I0212 19:42:43.670200 2501 scope.go:117] "RemoveContainer" containerID="b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671" Feb 12 19:42:43.670439 kubelet[2501]: E0212 19:42:43.670421 2501 pod_workers.go:1300] "Error syncing pod, skipping" err="failed to \"StartContainer\" for \"tigera-operator\" with CrashLoopBackOff: \"back-off 10s restarting failed container=tigera-operator pod=tigera-operator-55585899bf-njdmq_tigera-operator(7257fa7c-d5a4-4651-a1ff-32ed43c6a10f)\"" pod="tigera-operator/tigera-operator-55585899bf-njdmq" podUID="7257fa7c-d5a4-4651-a1ff-32ed43c6a10f" Feb 12 19:42:43.671691 env[1376]: time="2024-02-12T19:42:43.671633226Z" level=info msg="RemoveContainer for \"55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc\"" Feb 12 19:42:43.684677 env[1376]: time="2024-02-12T19:42:43.684617499Z" level=info msg="RemoveContainer for \"55be895569ac68b04c73e3416b0fd6db47c0623e2ad65e8e7e214e4bf9ddf3dc\" returns successfully" Feb 12 19:42:46.076617 kubelet[2501]: I0212 19:42:46.076586 2501 status_manager.go:853] "Failed to get status for pod" podUID="41054977f0f7210187b7561c319502f4" pod="kube-system/kube-controller-manager-ci-3510.3.2-a-04a5975e1d" err="rpc error: code = Unavailable desc = error reading from server: read tcp 10.200.20.13:34552->10.200.20.10:2379: read: connection timed out" Feb 12 19:42:49.217000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.223410 kernel: kauditd_printk_skb: 51 callbacks suppressed Feb 12 19:42:49.246841 kernel: audit: type=1400 audit(1707766969.217:1707): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=520999 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.246925 kernel: audit: type=1300 audit(1707766969.217:1707): arch=c00000b7 syscall=27 success=no exit=-13 a0=5b a1=4008f156e0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:42:49.217000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5b a1=4008f156e0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:42:49.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:42:49.298438 kernel: audit: type=1327 audit(1707766969.217:1707): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:42:49.298563 kernel: audit: type=1400 audit(1707766969.217:1708): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.217000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.217000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5b a1=400f9b6ea0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:42:49.348466 kernel: audit: type=1300 audit(1707766969.217:1708): arch=c00000b7 syscall=27 success=no exit=-13 a0=5b a1=400f9b6ea0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:42:49.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:42:49.373489 kernel: audit: type=1327 audit(1707766969.217:1708): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:42:49.373615 kernel: audit: type=1400 audit(1707766969.217:1709): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.217000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.217000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5b a1=4008786cf0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:42:49.424931 kernel: audit: type=1300 audit(1707766969.217:1709): arch=c00000b7 syscall=27 success=no exit=-13 a0=5b a1=4008786cf0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:42:49.217000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:42:49.450237 kernel: audit: type=1327 audit(1707766969.217:1709): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:42:49.450359 kernel: audit: type=1400 audit(1707766969.218:1710): avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.218000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=521005 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.218000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5b a1=4008786e70 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:42:49.218000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:42:49.283000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=520988 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.283000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5b a1=400f9b78a0 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:42:49.283000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:42:49.407000 audit[2333]: AVC avc: denied { watch } for pid=2333 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=521003 scontext=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Feb 12 19:42:49.407000 audit[2333]: SYSCALL arch=c00000b7 syscall=27 success=no exit=-13 a0=5b a1=4008f15b00 a2=fc6 a3=0 items=0 ppid=2194 pid=2333 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c229,c565 key=(null) Feb 12 19:42:49.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E32302E3133002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B7562 Feb 12 19:42:52.751276 kubelet[2501]: E0212 19:42:52.751235 2501 controller.go:193] "Failed to update lease" err="Put \"https://10.200.20.13:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.2-a-04a5975e1d?timeout=10s\": net/http: request canceled (Client.Timeout exceeded while awaiting headers)" Feb 12 19:42:52.759146 kubelet[2501]: W0212 19:42:52.759114 2501 machine.go:65] Cannot read vendor id correctly, set empty. Feb 12 19:42:57.288128 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.305190 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.321626 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.337937 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.354545 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.379598 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.379850 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.399846 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.400180 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.409385 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.409637 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.427753 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.427999 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.445474 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.445754 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.463023 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.472137 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.481364 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.481602 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.499360 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.499597 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.518685 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.528503 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.528724 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.547525 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.547834 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.565918 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.566200 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.584309 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.584600 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.601933 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.602201 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.618971 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.619211 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.636526 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.636803 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.653853 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.662798 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.663002 kubelet[2501]: I0212 19:42:57.662767 2501 scope.go:117] "RemoveContainer" containerID="b303cac11fde9be1ba904ced1d27d1d2c1bdb959a1d734cc392524855ae4b671" Feb 12 19:42:57.673302 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.673507 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.673637 env[1376]: time="2024-02-12T19:42:57.673059740Z" level=info msg="CreateContainer within sandbox \"d8cae7e7b4b4ec550cb59b64af6fb14605f71a3a1162ab773660a6c31a76aac8\" for container &ContainerMetadata{Name:tigera-operator,Attempt:2,}" Feb 12 19:42:57.679926 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.688447 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.696880 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.714848 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.715139 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.723647 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.732586 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.740775 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.748762 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.765559 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.765830 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.781641 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.781882 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.789471 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.797489 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.805402 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.821729 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.821958 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.830009 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.838072 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.846165 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.854068 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.867347 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.873815 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.878777 systemd[1]: run-containerd-runc-k8s.io-45733618e3bc65ace6d870cc92678eb306b6639155173b42071fdafba74923aa-runc.BzBhKF.mount: Deactivated successfully. Feb 12 19:42:57.887790 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.888030 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.895562 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.903443 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.911531 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.919476 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.947471 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.947741 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.947857 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.955695 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.971986 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.972253 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.980257 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.988541 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:57.996367 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.004468 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.012311 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.020372 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.028500 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.036625 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.044444 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.052621 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.060713 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.077767 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.077988 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.086114 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.094545 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.102888 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.112798 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.121086 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.129498 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.137556 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.145983 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.154141 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.162763 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.170842 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.179676 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.188120 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.196520 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.204604 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.213582 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#25 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.221889 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.230204 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.238302 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.246136 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#29 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.254251 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#30 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.262342 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#18 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.270676 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#20 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.279058 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#21 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.287419 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#22 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.295802 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#23 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.303913 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#24 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.312098 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#19 cmd 0x2a status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.320144 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#25 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.328248 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#26 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.337273 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#27 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001 Feb 12 19:42:58.345801 kernel: hv_storvsc f8b3781a-1e82-4818-a1c3-63d806ec15bb: tag#28 cmd 0x28 status: scsi 0x2 srb 0x4 hv 0xc0000001