Dec 13 01:46:21.035964 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 01:46:21.035988 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:46:21.035997 kernel: BIOS-provided physical RAM map: Dec 13 01:46:21.036005 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:46:21.036010 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Dec 13 01:46:21.036018 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Dec 13 01:46:21.036028 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Dec 13 01:46:21.036034 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Dec 13 01:46:21.036042 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Dec 13 01:46:21.036049 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Dec 13 01:46:21.036056 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Dec 13 01:46:21.036064 kernel: printk: bootconsole [earlyser0] enabled Dec 13 01:46:21.036069 kernel: NX (Execute Disable) protection: active Dec 13 01:46:21.036075 kernel: efi: EFI v2.70 by Microsoft Dec 13 01:46:21.036087 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Dec 13 01:46:21.036094 kernel: random: crng init done Dec 13 01:46:21.036103 kernel: SMBIOS 3.1.0 present. Dec 13 01:46:21.036109 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Dec 13 01:46:21.036115 kernel: Hypervisor detected: Microsoft Hyper-V Dec 13 01:46:21.036124 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Dec 13 01:46:21.036132 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Dec 13 01:46:21.036140 kernel: Hyper-V: Nested features: 0x1e0101 Dec 13 01:46:21.036149 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Dec 13 01:46:21.036155 kernel: Hyper-V: Using hypercall for remote TLB flush Dec 13 01:46:21.036162 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Dec 13 01:46:21.036170 kernel: tsc: Marking TSC unstable due to running on Hyper-V Dec 13 01:46:21.036177 kernel: tsc: Detected 2593.905 MHz processor Dec 13 01:46:21.036187 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 01:46:21.036193 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 01:46:21.036199 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Dec 13 01:46:21.036209 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 01:46:21.036216 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Dec 13 01:46:21.036227 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Dec 13 01:46:21.036233 kernel: Using GB pages for direct mapping Dec 13 01:46:21.036239 kernel: Secure boot disabled Dec 13 01:46:21.036248 kernel: ACPI: Early table checksum verification disabled Dec 13 01:46:21.036256 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Dec 13 01:46:21.036263 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:21.036271 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:21.036278 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Dec 13 01:46:21.036292 kernel: ACPI: FACS 0x000000003FFFE000 000040 Dec 13 01:46:21.036299 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:21.036309 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:21.036316 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:21.036322 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:21.036332 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:21.036341 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:21.036351 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:21.036358 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Dec 13 01:46:21.036365 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Dec 13 01:46:21.036375 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Dec 13 01:46:21.036381 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Dec 13 01:46:21.036392 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Dec 13 01:46:21.036398 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Dec 13 01:46:21.036407 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Dec 13 01:46:21.036417 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Dec 13 01:46:21.036424 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Dec 13 01:46:21.036434 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Dec 13 01:46:21.036441 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 01:46:21.036447 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 01:46:21.036457 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Dec 13 01:46:21.036464 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Dec 13 01:46:21.036474 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Dec 13 01:46:21.036483 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Dec 13 01:46:21.036490 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Dec 13 01:46:21.036500 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Dec 13 01:46:21.036507 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Dec 13 01:46:21.036517 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Dec 13 01:46:21.036524 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Dec 13 01:46:21.036531 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Dec 13 01:46:21.036540 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Dec 13 01:46:21.036547 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Dec 13 01:46:21.043592 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Dec 13 01:46:21.043610 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Dec 13 01:46:21.043622 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Dec 13 01:46:21.043634 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Dec 13 01:46:21.043646 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Dec 13 01:46:21.043658 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Dec 13 01:46:21.043671 kernel: Zone ranges: Dec 13 01:46:21.043683 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 01:46:21.043695 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 01:46:21.043711 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 01:46:21.043723 kernel: Movable zone start for each node Dec 13 01:46:21.043735 kernel: Early memory node ranges Dec 13 01:46:21.043747 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 01:46:21.043760 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Dec 13 01:46:21.043774 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Dec 13 01:46:21.043788 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 01:46:21.043801 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Dec 13 01:46:21.043815 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:46:21.043830 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 01:46:21.043843 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Dec 13 01:46:21.043856 kernel: ACPI: PM-Timer IO Port: 0x408 Dec 13 01:46:21.043870 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Dec 13 01:46:21.043883 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Dec 13 01:46:21.043895 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 01:46:21.043910 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 01:46:21.043923 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Dec 13 01:46:21.043937 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 01:46:21.043954 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Dec 13 01:46:21.043968 kernel: Booting paravirtualized kernel on Hyper-V Dec 13 01:46:21.043981 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 01:46:21.043995 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 01:46:21.044008 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 01:46:21.044020 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 01:46:21.044032 kernel: pcpu-alloc: [0] 0 1 Dec 13 01:46:21.044043 kernel: Hyper-V: PV spinlocks enabled Dec 13 01:46:21.044053 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 01:46:21.044066 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Dec 13 01:46:21.044077 kernel: Policy zone: Normal Dec 13 01:46:21.044090 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:46:21.044101 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 01:46:21.044113 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 01:46:21.044125 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 01:46:21.044137 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 01:46:21.044150 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 308056K reserved, 0K cma-reserved) Dec 13 01:46:21.044165 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 01:46:21.044176 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 01:46:21.044197 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 01:46:21.044212 kernel: rcu: Hierarchical RCU implementation. Dec 13 01:46:21.044225 kernel: rcu: RCU event tracing is enabled. Dec 13 01:46:21.044237 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 01:46:21.044249 kernel: Rude variant of Tasks RCU enabled. Dec 13 01:46:21.044262 kernel: Tracing variant of Tasks RCU enabled. Dec 13 01:46:21.044275 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 01:46:21.044287 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 01:46:21.044300 kernel: Using NULL legacy PIC Dec 13 01:46:21.044315 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Dec 13 01:46:21.044327 kernel: Console: colour dummy device 80x25 Dec 13 01:46:21.044340 kernel: printk: console [tty1] enabled Dec 13 01:46:21.044352 kernel: printk: console [ttyS0] enabled Dec 13 01:46:21.044365 kernel: printk: bootconsole [earlyser0] disabled Dec 13 01:46:21.044380 kernel: ACPI: Core revision 20210730 Dec 13 01:46:21.044393 kernel: Failed to register legacy timer interrupt Dec 13 01:46:21.044405 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 01:46:21.044418 kernel: Hyper-V: Using IPI hypercalls Dec 13 01:46:21.044430 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593905) Dec 13 01:46:21.044443 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 01:46:21.044455 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 01:46:21.044467 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 01:46:21.044479 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 01:46:21.044492 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 01:46:21.044506 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 01:46:21.044519 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 01:46:21.044532 kernel: RETBleed: Vulnerable Dec 13 01:46:21.044545 kernel: Speculative Store Bypass: Vulnerable Dec 13 01:46:21.044570 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 01:46:21.044583 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 01:46:21.044596 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 01:46:21.044608 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 01:46:21.044621 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 01:46:21.044633 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 01:46:21.044649 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 01:46:21.044661 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 01:46:21.044674 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 01:46:21.044686 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 01:46:21.044699 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 01:46:21.044712 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 01:46:21.044725 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 01:46:21.044738 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Dec 13 01:46:21.044750 kernel: Freeing SMP alternatives memory: 32K Dec 13 01:46:21.044762 kernel: pid_max: default: 32768 minimum: 301 Dec 13 01:46:21.044775 kernel: LSM: Security Framework initializing Dec 13 01:46:21.044788 kernel: SELinux: Initializing. Dec 13 01:46:21.044803 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 01:46:21.044817 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 01:46:21.044830 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 01:46:21.044843 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 01:46:21.044856 kernel: signal: max sigframe size: 3632 Dec 13 01:46:21.044869 kernel: rcu: Hierarchical SRCU implementation. Dec 13 01:46:21.044882 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 01:46:21.044895 kernel: smp: Bringing up secondary CPUs ... Dec 13 01:46:21.044908 kernel: x86: Booting SMP configuration: Dec 13 01:46:21.044921 kernel: .... node #0, CPUs: #1 Dec 13 01:46:21.044937 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Dec 13 01:46:21.044951 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 01:46:21.044964 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 01:46:21.044978 kernel: smpboot: Max logical packages: 1 Dec 13 01:46:21.044992 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Dec 13 01:46:21.045004 kernel: devtmpfs: initialized Dec 13 01:46:21.045018 kernel: x86/mm: Memory block size: 128MB Dec 13 01:46:21.045031 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Dec 13 01:46:21.045047 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 01:46:21.045061 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 01:46:21.045073 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 01:46:21.045085 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 01:46:21.045099 kernel: audit: initializing netlink subsys (disabled) Dec 13 01:46:21.045112 kernel: audit: type=2000 audit(1734054379.024:1): state=initialized audit_enabled=0 res=1 Dec 13 01:46:21.045124 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 01:46:21.045138 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 01:46:21.045151 kernel: cpuidle: using governor menu Dec 13 01:46:21.045167 kernel: ACPI: bus type PCI registered Dec 13 01:46:21.045181 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 01:46:21.045194 kernel: dca service started, version 1.12.1 Dec 13 01:46:21.045208 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 01:46:21.045220 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 01:46:21.045233 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 01:46:21.045247 kernel: ACPI: Added _OSI(Module Device) Dec 13 01:46:21.045260 kernel: ACPI: Added _OSI(Processor Device) Dec 13 01:46:21.045273 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 01:46:21.045288 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 01:46:21.045300 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 01:46:21.045313 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 01:46:21.045326 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 01:46:21.045339 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 01:46:21.045352 kernel: ACPI: Interpreter enabled Dec 13 01:46:21.045365 kernel: ACPI: PM: (supports S0 S5) Dec 13 01:46:21.045378 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 01:46:21.045392 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 01:46:21.045408 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Dec 13 01:46:21.045423 kernel: iommu: Default domain type: Translated Dec 13 01:46:21.045437 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 01:46:21.045450 kernel: vgaarb: loaded Dec 13 01:46:21.045462 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 01:46:21.045475 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 01:46:21.045487 kernel: PTP clock support registered Dec 13 01:46:21.045500 kernel: Registered efivars operations Dec 13 01:46:21.045512 kernel: PCI: Using ACPI for IRQ routing Dec 13 01:46:21.045524 kernel: PCI: System does not support PCI Dec 13 01:46:21.045539 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Dec 13 01:46:21.045552 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 01:46:21.045575 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 01:46:21.045587 kernel: pnp: PnP ACPI init Dec 13 01:46:21.045600 kernel: pnp: PnP ACPI: found 3 devices Dec 13 01:46:21.045613 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 01:46:21.045625 kernel: NET: Registered PF_INET protocol family Dec 13 01:46:21.045638 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 01:46:21.045654 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 01:46:21.045667 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 01:46:21.045679 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 01:46:21.045692 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 01:46:21.045705 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 01:46:21.045718 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 01:46:21.045731 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 01:46:21.045744 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 01:46:21.045756 kernel: NET: Registered PF_XDP protocol family Dec 13 01:46:21.045771 kernel: PCI: CLS 0 bytes, default 64 Dec 13 01:46:21.045784 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 01:46:21.045797 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Dec 13 01:46:21.045810 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 01:46:21.045823 kernel: Initialise system trusted keyrings Dec 13 01:46:21.045836 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 01:46:21.045849 kernel: Key type asymmetric registered Dec 13 01:46:21.045861 kernel: Asymmetric key parser 'x509' registered Dec 13 01:46:21.045874 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 01:46:21.045889 kernel: io scheduler mq-deadline registered Dec 13 01:46:21.045902 kernel: io scheduler kyber registered Dec 13 01:46:21.045915 kernel: io scheduler bfq registered Dec 13 01:46:21.045928 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 01:46:21.045941 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 01:46:21.045954 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 01:46:21.045967 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 01:46:21.045980 kernel: i8042: PNP: No PS/2 controller found. Dec 13 01:46:21.046140 kernel: rtc_cmos 00:02: registered as rtc0 Dec 13 01:46:21.046261 kernel: rtc_cmos 00:02: setting system clock to 2024-12-13T01:46:20 UTC (1734054380) Dec 13 01:46:21.046371 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Dec 13 01:46:21.046386 kernel: fail to initialize ptp_kvm Dec 13 01:46:21.046398 kernel: intel_pstate: CPU model not supported Dec 13 01:46:21.046411 kernel: efifb: probing for efifb Dec 13 01:46:21.046424 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 01:46:21.046437 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 01:46:21.046450 kernel: efifb: scrolling: redraw Dec 13 01:46:21.046468 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 01:46:21.046480 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 01:46:21.046494 kernel: fb0: EFI VGA frame buffer device Dec 13 01:46:21.046508 kernel: pstore: Registered efi as persistent store backend Dec 13 01:46:21.046521 kernel: NET: Registered PF_INET6 protocol family Dec 13 01:46:21.046534 kernel: Segment Routing with IPv6 Dec 13 01:46:21.046548 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 01:46:21.046577 kernel: NET: Registered PF_PACKET protocol family Dec 13 01:46:21.046595 kernel: Key type dns_resolver registered Dec 13 01:46:21.046612 kernel: IPI shorthand broadcast: enabled Dec 13 01:46:21.046625 kernel: sched_clock: Marking stable (792176200, 23518500)->(1021804300, -206109600) Dec 13 01:46:21.046637 kernel: registered taskstats version 1 Dec 13 01:46:21.046651 kernel: Loading compiled-in X.509 certificates Dec 13 01:46:21.046665 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 01:46:21.046678 kernel: Key type .fscrypt registered Dec 13 01:46:21.046691 kernel: Key type fscrypt-provisioning registered Dec 13 01:46:21.046704 kernel: pstore: Using crash dump compression: deflate Dec 13 01:46:21.046719 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 01:46:21.046730 kernel: ima: Allocated hash algorithm: sha1 Dec 13 01:46:21.046742 kernel: ima: No architecture policies found Dec 13 01:46:21.046755 kernel: clk: Disabling unused clocks Dec 13 01:46:21.046768 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 01:46:21.046782 kernel: Write protecting the kernel read-only data: 28672k Dec 13 01:46:21.046796 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 01:46:21.046809 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 01:46:21.046821 kernel: Run /init as init process Dec 13 01:46:21.046832 kernel: with arguments: Dec 13 01:46:21.046844 kernel: /init Dec 13 01:46:21.046851 kernel: with environment: Dec 13 01:46:21.046858 kernel: HOME=/ Dec 13 01:46:21.046865 kernel: TERM=linux Dec 13 01:46:21.046872 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 01:46:21.046882 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:46:21.046895 systemd[1]: Detected virtualization microsoft. Dec 13 01:46:21.046912 systemd[1]: Detected architecture x86-64. Dec 13 01:46:21.046927 systemd[1]: Running in initrd. Dec 13 01:46:21.046942 systemd[1]: No hostname configured, using default hostname. Dec 13 01:46:21.046955 systemd[1]: Hostname set to . Dec 13 01:46:21.046970 systemd[1]: Initializing machine ID from random generator. Dec 13 01:46:21.046984 systemd[1]: Queued start job for default target initrd.target. Dec 13 01:46:21.046999 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:46:21.047013 systemd[1]: Reached target cryptsetup.target. Dec 13 01:46:21.047027 systemd[1]: Reached target paths.target. Dec 13 01:46:21.047045 systemd[1]: Reached target slices.target. Dec 13 01:46:21.047060 systemd[1]: Reached target swap.target. Dec 13 01:46:21.047074 systemd[1]: Reached target timers.target. Dec 13 01:46:21.047090 systemd[1]: Listening on iscsid.socket. Dec 13 01:46:21.047102 systemd[1]: Listening on iscsiuio.socket. Dec 13 01:46:21.047115 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:46:21.047126 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:46:21.047142 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:46:21.047154 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:46:21.047166 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:46:21.047180 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:46:21.047194 systemd[1]: Reached target sockets.target. Dec 13 01:46:21.047209 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:46:21.047223 systemd[1]: Finished network-cleanup.service. Dec 13 01:46:21.047237 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 01:46:21.047251 systemd[1]: Starting systemd-journald.service... Dec 13 01:46:21.047268 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:46:21.047283 systemd[1]: Starting systemd-resolved.service... Dec 13 01:46:21.047297 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 01:46:21.047315 systemd-journald[183]: Journal started Dec 13 01:46:21.047384 systemd-journald[183]: Runtime Journal (/run/log/journal/f4a0445feab14b3f842b3d02c67f865a) is 8.0M, max 159.0M, 151.0M free. Dec 13 01:46:21.039954 systemd-modules-load[184]: Inserted module 'overlay' Dec 13 01:46:21.057349 systemd[1]: Started systemd-journald.service. Dec 13 01:46:21.063000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.075419 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:46:21.079797 kernel: audit: type=1130 audit(1734054381.063:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.080603 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 01:46:21.077000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.097567 kernel: audit: type=1130 audit(1734054381.077:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.083588 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 01:46:21.103845 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 01:46:21.106575 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:46:21.128553 systemd-resolved[185]: Positive Trust Anchors: Dec 13 01:46:21.130333 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:46:21.080000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.149025 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:46:21.190803 kernel: audit: type=1130 audit(1734054381.080:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.190843 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 01:46:21.190858 kernel: audit: type=1130 audit(1734054381.102:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.190873 kernel: audit: type=1130 audit(1734054381.130:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.102000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.149119 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:46:21.152397 systemd-resolved[185]: Defaulting to hostname 'linux'. Dec 13 01:46:21.224270 kernel: Bridge firewalling registered Dec 13 01:46:21.224294 kernel: audit: type=1130 audit(1734054381.190:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.190000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.159551 systemd[1]: Started systemd-resolved.service. Dec 13 01:46:21.191093 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 01:46:21.222785 systemd-modules-load[184]: Inserted module 'br_netfilter' Dec 13 01:46:21.222947 systemd[1]: Reached target nss-lookup.target. Dec 13 01:46:21.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.240572 kernel: audit: type=1130 audit(1734054381.222:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.246718 systemd[1]: Starting dracut-cmdline.service... Dec 13 01:46:21.263665 dracut-cmdline[200]: dracut-dracut-053 Dec 13 01:46:21.268241 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:46:21.296574 kernel: SCSI subsystem initialized Dec 13 01:46:21.322374 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 01:46:21.322432 kernel: device-mapper: uevent: version 1.0.3 Dec 13 01:46:21.330570 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 01:46:21.333612 systemd-modules-load[184]: Inserted module 'dm_multipath' Dec 13 01:46:21.336876 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:46:21.344265 kernel: Loading iSCSI transport class v2.0-870. Dec 13 01:46:21.344000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.345351 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:46:21.362659 kernel: audit: type=1130 audit(1734054381.344:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.370518 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:46:21.387319 kernel: audit: type=1130 audit(1734054381.372:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.393572 kernel: iscsi: registered transport (tcp) Dec 13 01:46:21.420597 kernel: iscsi: registered transport (qla4xxx) Dec 13 01:46:21.420647 kernel: QLogic iSCSI HBA Driver Dec 13 01:46:21.450061 systemd[1]: Finished dracut-cmdline.service. Dec 13 01:46:21.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.453655 systemd[1]: Starting dracut-pre-udev.service... Dec 13 01:46:21.506582 kernel: raid6: avx512x4 gen() 18413 MB/s Dec 13 01:46:21.526574 kernel: raid6: avx512x4 xor() 7525 MB/s Dec 13 01:46:21.547571 kernel: raid6: avx512x2 gen() 18383 MB/s Dec 13 01:46:21.568577 kernel: raid6: avx512x2 xor() 28555 MB/s Dec 13 01:46:21.588570 kernel: raid6: avx512x1 gen() 18181 MB/s Dec 13 01:46:21.608569 kernel: raid6: avx512x1 xor() 25367 MB/s Dec 13 01:46:21.628568 kernel: raid6: avx2x4 gen() 18175 MB/s Dec 13 01:46:21.648566 kernel: raid6: avx2x4 xor() 7601 MB/s Dec 13 01:46:21.668566 kernel: raid6: avx2x2 gen() 18342 MB/s Dec 13 01:46:21.689568 kernel: raid6: avx2x2 xor() 22045 MB/s Dec 13 01:46:21.709566 kernel: raid6: avx2x1 gen() 14119 MB/s Dec 13 01:46:21.729566 kernel: raid6: avx2x1 xor() 19506 MB/s Dec 13 01:46:21.749567 kernel: raid6: sse2x4 gen() 11755 MB/s Dec 13 01:46:21.769566 kernel: raid6: sse2x4 xor() 7174 MB/s Dec 13 01:46:21.789565 kernel: raid6: sse2x2 gen() 12925 MB/s Dec 13 01:46:21.809567 kernel: raid6: sse2x2 xor() 7516 MB/s Dec 13 01:46:21.829566 kernel: raid6: sse2x1 gen() 11664 MB/s Dec 13 01:46:21.852824 kernel: raid6: sse2x1 xor() 5931 MB/s Dec 13 01:46:21.852839 kernel: raid6: using algorithm avx512x4 gen() 18413 MB/s Dec 13 01:46:21.852864 kernel: raid6: .... xor() 7525 MB/s, rmw enabled Dec 13 01:46:21.856242 kernel: raid6: using avx512x2 recovery algorithm Dec 13 01:46:21.876594 kernel: xor: automatically using best checksumming function avx Dec 13 01:46:21.972589 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 01:46:21.980877 systemd[1]: Finished dracut-pre-udev.service. Dec 13 01:46:21.983000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:21.984000 audit: BPF prog-id=7 op=LOAD Dec 13 01:46:21.984000 audit: BPF prog-id=8 op=LOAD Dec 13 01:46:21.985656 systemd[1]: Starting systemd-udevd.service... Dec 13 01:46:22.001198 systemd-udevd[383]: Using default interface naming scheme 'v252'. Dec 13 01:46:22.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:22.008244 systemd[1]: Started systemd-udevd.service. Dec 13 01:46:22.011899 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 01:46:22.030514 dracut-pre-trigger[397]: rd.md=0: removing MD RAID activation Dec 13 01:46:22.060738 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 01:46:22.065000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:22.066735 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:46:22.103000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:22.100322 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:46:22.152578 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 01:46:22.166577 kernel: hv_vmbus: Vmbus version:5.2 Dec 13 01:46:22.189893 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 01:46:22.189954 kernel: AES CTR mode by8 optimization enabled Dec 13 01:46:22.197584 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 01:46:22.219651 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 01:46:22.219701 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 01:46:22.223583 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 01:46:22.223641 kernel: scsi host0: storvsc_host_t Dec 13 01:46:22.233578 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 01:46:22.234578 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 01:46:22.235575 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 01:46:22.256935 kernel: scsi host1: storvsc_host_t Dec 13 01:46:22.269582 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 01:46:22.281176 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 01:46:22.281232 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 01:46:22.297869 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 01:46:22.301694 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 01:46:22.301716 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 01:46:22.318769 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 01:46:22.340157 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 01:46:22.340290 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 01:46:22.340399 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 01:46:22.340496 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 01:46:22.340624 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:46:22.340642 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 01:46:22.437548 kernel: hv_netvsc 7c1e5221-30c4-7c1e-5221-30c47c1e5221 eth0: VF slot 1 added Dec 13 01:46:22.446576 kernel: hv_vmbus: registering driver hv_pci Dec 13 01:46:22.456521 kernel: hv_pci 49143c62-ac66-44a0-b8fd-eed43d851fb1: PCI VMBus probing: Using version 0x10004 Dec 13 01:46:22.532529 kernel: hv_pci 49143c62-ac66-44a0-b8fd-eed43d851fb1: PCI host bridge to bus ac66:00 Dec 13 01:46:22.532735 kernel: pci_bus ac66:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Dec 13 01:46:22.532901 kernel: pci_bus ac66:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 01:46:22.533045 kernel: pci ac66:00:02.0: [15b3:1016] type 00 class 0x020000 Dec 13 01:46:22.533242 kernel: pci ac66:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 01:46:22.533400 kernel: pci ac66:00:02.0: enabling Extended Tags Dec 13 01:46:22.533554 kernel: pci ac66:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at ac66:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Dec 13 01:46:22.533737 kernel: pci_bus ac66:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 01:46:22.533878 kernel: pci ac66:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 01:46:22.625584 kernel: mlx5_core ac66:00:02.0: firmware version: 14.30.5000 Dec 13 01:46:22.888876 kernel: mlx5_core ac66:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 01:46:22.889020 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (435) Dec 13 01:46:22.889033 kernel: mlx5_core ac66:00:02.0: Supported tc offload range - chains: 1, prios: 1 Dec 13 01:46:22.889131 kernel: mlx5_core ac66:00:02.0: mlx5e_tc_post_act_init:40:(pid 16): firmware level support is missing Dec 13 01:46:22.889227 kernel: hv_netvsc 7c1e5221-30c4-7c1e-5221-30c47c1e5221 eth0: VF registering: eth1 Dec 13 01:46:22.889320 kernel: mlx5_core ac66:00:02.0 eth1: joined to eth0 Dec 13 01:46:22.769271 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 01:46:22.810764 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:46:22.899583 kernel: mlx5_core ac66:00:02.0 enP44134s1: renamed from eth1 Dec 13 01:46:22.952839 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 01:46:22.975600 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 01:46:22.978657 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 01:46:22.990166 systemd[1]: Starting disk-uuid.service... Dec 13 01:46:23.004578 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:46:23.012576 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:46:24.021940 disk-uuid[559]: The operation has completed successfully. Dec 13 01:46:24.024662 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:46:24.099054 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 01:46:24.104000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.104000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.099183 systemd[1]: Finished disk-uuid.service. Dec 13 01:46:24.118568 systemd[1]: Starting verity-setup.service... Dec 13 01:46:24.152581 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 01:46:24.416268 systemd[1]: Found device dev-mapper-usr.device. Dec 13 01:46:24.421525 systemd[1]: Mounting sysusr-usr.mount... Dec 13 01:46:24.425729 systemd[1]: Finished verity-setup.service. Dec 13 01:46:24.427000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.497582 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 01:46:24.498189 systemd[1]: Mounted sysusr-usr.mount. Dec 13 01:46:24.500960 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 01:46:24.501771 systemd[1]: Starting ignition-setup.service... Dec 13 01:46:24.512681 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 01:46:24.534790 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:46:24.534849 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:46:24.534868 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:46:24.586743 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 01:46:24.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.591000 audit: BPF prog-id=9 op=LOAD Dec 13 01:46:24.592633 systemd[1]: Starting systemd-networkd.service... Dec 13 01:46:24.616724 systemd-networkd[800]: lo: Link UP Dec 13 01:46:24.616733 systemd-networkd[800]: lo: Gained carrier Dec 13 01:46:24.619157 systemd-networkd[800]: Enumeration completed Dec 13 01:46:24.620960 systemd-networkd[800]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:46:24.625000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.621477 systemd[1]: Started systemd-networkd.service. Dec 13 01:46:24.629183 systemd[1]: Reached target network.target. Dec 13 01:46:24.636320 systemd[1]: Starting iscsiuio.service... Dec 13 01:46:24.642402 systemd[1]: Started iscsiuio.service. Dec 13 01:46:24.646000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.648046 systemd[1]: Starting iscsid.service... Dec 13 01:46:24.653990 iscsid[809]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:46:24.653990 iscsid[809]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 01:46:24.653990 iscsid[809]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 01:46:24.653990 iscsid[809]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 01:46:24.653990 iscsid[809]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:46:24.653990 iscsid[809]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 01:46:24.654000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.653036 systemd[1]: Started iscsid.service. Dec 13 01:46:24.658950 systemd[1]: Starting dracut-initqueue.service... Dec 13 01:46:24.662070 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 01:46:24.699574 kernel: mlx5_core ac66:00:02.0 enP44134s1: Link up Dec 13 01:46:24.704346 systemd[1]: Finished dracut-initqueue.service. Dec 13 01:46:24.706000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.706848 systemd[1]: Reached target remote-fs-pre.target. Dec 13 01:46:24.711299 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:46:24.713748 systemd[1]: Reached target remote-fs.target. Dec 13 01:46:24.716796 systemd[1]: Starting dracut-pre-mount.service... Dec 13 01:46:24.730382 systemd[1]: Finished dracut-pre-mount.service. Dec 13 01:46:24.742538 kernel: hv_netvsc 7c1e5221-30c4-7c1e-5221-30c47c1e5221 eth0: Data path switched to VF: enP44134s1 Dec 13 01:46:24.742711 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:46:24.739000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.739988 systemd-networkd[800]: enP44134s1: Link UP Dec 13 01:46:24.740282 systemd-networkd[800]: eth0: Link UP Dec 13 01:46:24.740741 systemd-networkd[800]: eth0: Gained carrier Dec 13 01:46:24.746077 systemd-networkd[800]: enP44134s1: Gained carrier Dec 13 01:46:24.797660 systemd-networkd[800]: eth0: DHCPv4 address 10.200.8.4/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:46:24.892154 systemd[1]: Finished ignition-setup.service. Dec 13 01:46:24.896000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:24.897661 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 01:46:26.554798 systemd-networkd[800]: eth0: Gained IPv6LL Dec 13 01:46:28.424714 ignition[824]: Ignition 2.14.0 Dec 13 01:46:28.424733 ignition[824]: Stage: fetch-offline Dec 13 01:46:28.424826 ignition[824]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:46:28.424894 ignition[824]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:46:28.520534 ignition[824]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:46:28.523639 ignition[824]: parsed url from cmdline: "" Dec 13 01:46:28.523655 ignition[824]: no config URL provided Dec 13 01:46:28.523672 ignition[824]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:46:28.523690 ignition[824]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:46:28.554509 kernel: kauditd_printk_skb: 18 callbacks suppressed Dec 13 01:46:28.554544 kernel: audit: type=1130 audit(1734054388.531:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.531000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.526448 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 01:46:28.523715 ignition[824]: failed to fetch config: resource requires networking Dec 13 01:46:28.532632 systemd[1]: Starting ignition-fetch.service... Dec 13 01:46:28.525387 ignition[824]: Ignition finished successfully Dec 13 01:46:28.541171 ignition[830]: Ignition 2.14.0 Dec 13 01:46:28.541177 ignition[830]: Stage: fetch Dec 13 01:46:28.541285 ignition[830]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:46:28.541311 ignition[830]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:46:28.544343 ignition[830]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:46:28.563223 ignition[830]: parsed url from cmdline: "" Dec 13 01:46:28.563229 ignition[830]: no config URL provided Dec 13 01:46:28.563237 ignition[830]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:46:28.563247 ignition[830]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:46:28.563285 ignition[830]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 01:46:28.654087 ignition[830]: GET result: OK Dec 13 01:46:28.654209 ignition[830]: config has been read from IMDS userdata Dec 13 01:46:28.654250 ignition[830]: parsing config with SHA512: a09f579c023643900ea7323b3aa1d614d9a1078bd69f737c7ceb7f7b84195af609ca9330420dd96ae3c4684f303412be839bf291dc5acb850e3ad32626ae7291 Dec 13 01:46:28.658921 unknown[830]: fetched base config from "system" Dec 13 01:46:28.659462 ignition[830]: fetch: fetch complete Dec 13 01:46:28.679165 kernel: audit: type=1130 audit(1734054388.663:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.663000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.658928 unknown[830]: fetched base config from "system" Dec 13 01:46:28.659470 ignition[830]: fetch: fetch passed Dec 13 01:46:28.658933 unknown[830]: fetched user config from "azure" Dec 13 01:46:28.659522 ignition[830]: Ignition finished successfully Dec 13 01:46:28.661132 systemd[1]: Finished ignition-fetch.service. Dec 13 01:46:28.665604 systemd[1]: Starting ignition-kargs.service... Dec 13 01:46:28.701068 ignition[836]: Ignition 2.14.0 Dec 13 01:46:28.701079 ignition[836]: Stage: kargs Dec 13 01:46:28.701209 ignition[836]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:46:28.701235 ignition[836]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:46:28.709377 ignition[836]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:46:28.714506 ignition[836]: kargs: kargs passed Dec 13 01:46:28.714580 ignition[836]: Ignition finished successfully Dec 13 01:46:28.719201 systemd[1]: Finished ignition-kargs.service. Dec 13 01:46:28.721000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.733578 kernel: audit: type=1130 audit(1734054388.721:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.733912 systemd[1]: Starting ignition-disks.service... Dec 13 01:46:28.742430 ignition[842]: Ignition 2.14.0 Dec 13 01:46:28.742440 ignition[842]: Stage: disks Dec 13 01:46:28.742602 ignition[842]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:46:28.742629 ignition[842]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:46:28.745188 ignition[842]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:46:28.752239 ignition[842]: disks: disks passed Dec 13 01:46:28.752289 ignition[842]: Ignition finished successfully Dec 13 01:46:28.772153 kernel: audit: type=1130 audit(1734054388.756:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.756000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.753818 systemd[1]: Finished ignition-disks.service. Dec 13 01:46:28.757705 systemd[1]: Reached target initrd-root-device.target. Dec 13 01:46:28.772159 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:46:28.774145 systemd[1]: Reached target local-fs.target. Dec 13 01:46:28.775975 systemd[1]: Reached target sysinit.target. Dec 13 01:46:28.778033 systemd[1]: Reached target basic.target. Dec 13 01:46:28.783158 systemd[1]: Starting systemd-fsck-root.service... Dec 13 01:46:28.845459 systemd-fsck[850]: ROOT: clean, 621/7326000 files, 481077/7359488 blocks Dec 13 01:46:28.855144 systemd[1]: Finished systemd-fsck-root.service. Dec 13 01:46:28.859000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.860311 systemd[1]: Mounting sysroot.mount... Dec 13 01:46:28.875892 kernel: audit: type=1130 audit(1734054388.859:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:28.885581 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 01:46:28.886969 systemd[1]: Mounted sysroot.mount. Dec 13 01:46:28.889045 systemd[1]: Reached target initrd-root-fs.target. Dec 13 01:46:28.923322 systemd[1]: Mounting sysroot-usr.mount... Dec 13 01:46:28.928943 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 01:46:28.934419 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 01:46:28.935352 systemd[1]: Reached target ignition-diskful.target. Dec 13 01:46:28.944978 systemd[1]: Mounted sysroot-usr.mount. Dec 13 01:46:29.006385 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:46:29.008730 systemd[1]: Starting initrd-setup-root.service... Dec 13 01:46:29.027603 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (861) Dec 13 01:46:29.033399 initrd-setup-root[866]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 01:46:29.043926 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:46:29.043950 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:46:29.043978 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:46:29.047076 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:46:29.063673 initrd-setup-root[892]: cut: /sysroot/etc/group: No such file or directory Dec 13 01:46:29.083434 initrd-setup-root[900]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 01:46:29.089818 initrd-setup-root[908]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 01:46:29.733399 systemd[1]: Finished initrd-setup-root.service. Dec 13 01:46:29.735000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:29.736918 systemd[1]: Starting ignition-mount.service... Dec 13 01:46:29.758333 kernel: audit: type=1130 audit(1734054389.735:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:29.757225 systemd[1]: Starting sysroot-boot.service... Dec 13 01:46:29.764648 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 01:46:29.767410 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 01:46:29.827633 ignition[928]: INFO : Ignition 2.14.0 Dec 13 01:46:29.827633 ignition[928]: INFO : Stage: mount Dec 13 01:46:29.833903 ignition[928]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:46:29.833903 ignition[928]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:46:29.871840 kernel: audit: type=1130 audit(1734054389.833:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:29.871876 kernel: audit: type=1130 audit(1734054389.852:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:29.833000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:29.852000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:29.830649 systemd[1]: Finished sysroot-boot.service. Dec 13 01:46:29.873963 ignition[928]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:46:29.873963 ignition[928]: INFO : mount: mount passed Dec 13 01:46:29.873963 ignition[928]: INFO : Ignition finished successfully Dec 13 01:46:29.844319 systemd[1]: Finished ignition-mount.service. Dec 13 01:46:30.525295 coreos-metadata[860]: Dec 13 01:46:30.525 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 01:46:30.572426 coreos-metadata[860]: Dec 13 01:46:30.572 INFO Fetch successful Dec 13 01:46:30.606368 coreos-metadata[860]: Dec 13 01:46:30.606 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 01:46:30.624397 coreos-metadata[860]: Dec 13 01:46:30.624 INFO Fetch successful Dec 13 01:46:30.638703 coreos-metadata[860]: Dec 13 01:46:30.638 INFO wrote hostname ci-3510.3.6-a-04a43feb01 to /sysroot/etc/hostname Dec 13 01:46:30.645000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:30.640899 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 01:46:30.663040 kernel: audit: type=1130 audit(1734054390.645:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:30.646919 systemd[1]: Starting ignition-files.service... Dec 13 01:46:30.666509 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:46:30.718587 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (939) Dec 13 01:46:30.718652 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:46:30.727284 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:46:30.727308 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:46:30.737353 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:46:30.751701 ignition[958]: INFO : Ignition 2.14.0 Dec 13 01:46:30.751701 ignition[958]: INFO : Stage: files Dec 13 01:46:30.756050 ignition[958]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:46:30.756050 ignition[958]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:46:30.768869 ignition[958]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:46:30.789596 ignition[958]: DEBUG : files: compiled without relabeling support, skipping Dec 13 01:46:30.793039 ignition[958]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 01:46:30.793039 ignition[958]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 01:46:30.880325 ignition[958]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 01:46:30.884456 ignition[958]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 01:46:30.884456 ignition[958]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 01:46:30.881109 unknown[958]: wrote ssh authorized keys file for user: core Dec 13 01:46:30.895908 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:46:30.901051 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 01:46:30.992947 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 01:46:31.179146 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:46:31.179146 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 01:46:31.189769 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 01:46:31.194495 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:46:31.199763 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 01:46:31.204606 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 01:46:31.265615 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (961) Dec 13 01:46:31.222765 systemd[1]: mnt-oem494690468.mount: Deactivated successfully. Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem494690468" Dec 13 01:46:31.268543 ignition[958]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem494690468": device or resource busy Dec 13 01:46:31.268543 ignition[958]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem494690468", trying btrfs: device or resource busy Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem494690468" Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem494690468" Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem494690468" Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem494690468" Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1041513555" Dec 13 01:46:31.268543 ignition[958]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1041513555": device or resource busy Dec 13 01:46:31.268543 ignition[958]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem1041513555", trying btrfs: device or resource busy Dec 13 01:46:31.268543 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1041513555" Dec 13 01:46:31.242694 systemd[1]: mnt-oem1041513555.mount: Deactivated successfully. Dec 13 01:46:31.349777 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem1041513555" Dec 13 01:46:31.349777 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem1041513555" Dec 13 01:46:31.349777 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem1041513555" Dec 13 01:46:31.349777 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 01:46:31.349777 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:46:31.349777 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.29.2-x86-64.raw: attempt #1 Dec 13 01:46:31.753484 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Dec 13 01:46:32.157033 ignition[958]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.29.2-x86-64.raw" Dec 13 01:46:32.157033 ignition[958]: INFO : files: op(13): [started] processing unit "waagent.service" Dec 13 01:46:32.157033 ignition[958]: INFO : files: op(13): [finished] processing unit "waagent.service" Dec 13 01:46:32.157033 ignition[958]: INFO : files: op(14): [started] processing unit "nvidia.service" Dec 13 01:46:32.157033 ignition[958]: INFO : files: op(14): [finished] processing unit "nvidia.service" Dec 13 01:46:32.157033 ignition[958]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Dec 13 01:46:32.202079 kernel: audit: type=1130 audit(1734054392.169:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.169000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.202160 ignition[958]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:46:32.202160 ignition[958]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:46:32.202160 ignition[958]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Dec 13 01:46:32.202160 ignition[958]: INFO : files: op(17): [started] setting preset to enabled for "waagent.service" Dec 13 01:46:32.202160 ignition[958]: INFO : files: op(17): [finished] setting preset to enabled for "waagent.service" Dec 13 01:46:32.202160 ignition[958]: INFO : files: op(18): [started] setting preset to enabled for "nvidia.service" Dec 13 01:46:32.202160 ignition[958]: INFO : files: op(18): [finished] setting preset to enabled for "nvidia.service" Dec 13 01:46:32.202160 ignition[958]: INFO : files: op(19): [started] setting preset to enabled for "prepare-helm.service" Dec 13 01:46:32.202160 ignition[958]: INFO : files: op(19): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 01:46:32.202160 ignition[958]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:46:32.202160 ignition[958]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:46:32.202160 ignition[958]: INFO : files: files passed Dec 13 01:46:32.202160 ignition[958]: INFO : Ignition finished successfully Dec 13 01:46:32.214000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.214000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.236000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.163938 systemd[1]: Finished ignition-files.service. Dec 13 01:46:32.267000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.267000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.171647 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 01:46:32.273544 initrd-setup-root-after-ignition[984]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 01:46:32.189463 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 01:46:32.190328 systemd[1]: Starting ignition-quench.service... Dec 13 01:46:32.208703 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 01:46:32.294000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.208803 systemd[1]: Finished ignition-quench.service. Dec 13 01:46:32.231330 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 01:46:32.237434 systemd[1]: Reached target ignition-complete.target. Dec 13 01:46:32.244373 systemd[1]: Starting initrd-parse-etc.service... Dec 13 01:46:32.263853 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 01:46:32.263974 systemd[1]: Finished initrd-parse-etc.service. Dec 13 01:46:32.268660 systemd[1]: Reached target initrd-fs.target. Dec 13 01:46:32.273527 systemd[1]: Reached target initrd.target. Dec 13 01:46:32.275603 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 01:46:32.276355 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 01:46:32.290340 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 01:46:32.309369 systemd[1]: Starting initrd-cleanup.service... Dec 13 01:46:32.319402 systemd[1]: Stopped target nss-lookup.target. Dec 13 01:46:32.334000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.321697 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 01:46:32.326479 systemd[1]: Stopped target timers.target. Dec 13 01:46:32.330540 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 01:46:32.330699 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 01:46:32.335124 systemd[1]: Stopped target initrd.target. Dec 13 01:46:32.339185 systemd[1]: Stopped target basic.target. Dec 13 01:46:32.343463 systemd[1]: Stopped target ignition-complete.target. Dec 13 01:46:32.347779 systemd[1]: Stopped target ignition-diskful.target. Dec 13 01:46:32.353103 systemd[1]: Stopped target initrd-root-device.target. Dec 13 01:46:32.357458 systemd[1]: Stopped target remote-fs.target. Dec 13 01:46:32.361603 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 01:46:32.365771 systemd[1]: Stopped target sysinit.target. Dec 13 01:46:32.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.370222 systemd[1]: Stopped target local-fs.target. Dec 13 01:46:32.374354 systemd[1]: Stopped target local-fs-pre.target. Dec 13 01:46:32.394000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.378796 systemd[1]: Stopped target swap.target. Dec 13 01:46:32.399000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.382759 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 01:46:32.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.382906 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 01:46:32.409000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.387012 systemd[1]: Stopped target cryptsetup.target. Dec 13 01:46:32.417000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.423000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.426000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.433864 ignition[997]: INFO : Ignition 2.14.0 Dec 13 01:46:32.433864 ignition[997]: INFO : Stage: umount Dec 13 01:46:32.433864 ignition[997]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:46:32.433864 ignition[997]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:46:32.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.390890 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 01:46:32.458661 iscsid[809]: iscsid shutting down. Dec 13 01:46:32.458000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.462000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.463171 ignition[997]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:46:32.463171 ignition[997]: INFO : umount: umount passed Dec 13 01:46:32.463171 ignition[997]: INFO : Ignition finished successfully Dec 13 01:46:32.468000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.475000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.391036 systemd[1]: Stopped dracut-initqueue.service. Dec 13 01:46:32.477000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.395163 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 01:46:32.395296 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 01:46:32.399971 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 01:46:32.400105 systemd[1]: Stopped ignition-files.service. Dec 13 01:46:32.404270 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 01:46:32.492000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.404403 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 01:46:32.410419 systemd[1]: Stopping ignition-mount.service... Dec 13 01:46:32.414002 systemd[1]: Stopping iscsid.service... Dec 13 01:46:32.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.415790 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 01:46:32.415931 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 01:46:32.419508 systemd[1]: Stopping sysroot-boot.service... Dec 13 01:46:32.421625 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 01:46:32.421813 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 01:46:32.424450 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 01:46:32.424607 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 01:46:32.429307 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 01:46:32.429424 systemd[1]: Stopped iscsid.service. Dec 13 01:46:32.445285 systemd[1]: Stopping iscsiuio.service... Dec 13 01:46:32.453790 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 01:46:32.453902 systemd[1]: Stopped iscsiuio.service. Dec 13 01:46:32.459094 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 01:46:32.459174 systemd[1]: Finished initrd-cleanup.service. Dec 13 01:46:32.463284 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 01:46:32.463374 systemd[1]: Stopped ignition-mount.service. Dec 13 01:46:32.469267 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 01:46:32.469318 systemd[1]: Stopped ignition-disks.service. Dec 13 01:46:32.475293 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 01:46:32.475345 systemd[1]: Stopped ignition-kargs.service. Dec 13 01:46:32.477895 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 01:46:32.477935 systemd[1]: Stopped ignition-fetch.service. Dec 13 01:46:32.492902 systemd[1]: Stopped target network.target. Dec 13 01:46:32.499780 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 01:46:32.501878 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 01:46:32.506238 systemd[1]: Stopped target paths.target. Dec 13 01:46:32.563220 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 01:46:32.566620 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 01:46:32.571464 systemd[1]: Stopped target slices.target. Dec 13 01:46:32.573000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.573697 systemd[1]: Stopped target sockets.target. Dec 13 01:46:32.574744 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 01:46:32.574790 systemd[1]: Closed iscsid.socket. Dec 13 01:46:32.595000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.575304 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 01:46:32.575333 systemd[1]: Closed iscsiuio.socket. Dec 13 01:46:32.575770 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 01:46:32.602000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.575811 systemd[1]: Stopped ignition-setup.service. Dec 13 01:46:32.604000 audit: BPF prog-id=6 op=UNLOAD Dec 13 01:46:32.576531 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:46:32.576805 systemd[1]: Stopping systemd-resolved.service... Dec 13 01:46:32.578361 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 01:46:32.618000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.589323 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 01:46:32.625000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.589428 systemd[1]: Stopped systemd-resolved.service. Dec 13 01:46:32.589803 systemd-networkd[800]: eth0: DHCPv6 lease lost Dec 13 01:46:32.627000 audit: BPF prog-id=9 op=UNLOAD Dec 13 01:46:32.632000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.598910 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:46:32.599009 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:46:32.605463 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 01:46:32.605514 systemd[1]: Closed systemd-networkd.socket. Dec 13 01:46:32.610389 systemd[1]: Stopping network-cleanup.service... Dec 13 01:46:32.613876 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 01:46:32.613944 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 01:46:32.618678 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 01:46:32.620994 systemd[1]: Stopped systemd-sysctl.service. Dec 13 01:46:32.654000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.625867 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 01:46:32.627725 systemd[1]: Stopped systemd-modules-load.service. Dec 13 01:46:32.634828 systemd[1]: Stopping systemd-udevd.service... Dec 13 01:46:32.651097 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 01:46:32.651645 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 01:46:32.651760 systemd[1]: Stopped systemd-udevd.service. Dec 13 01:46:32.657551 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 01:46:32.657634 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 01:46:32.678010 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 01:46:32.682000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.685000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.689000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.678064 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 01:46:32.680207 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 01:46:32.697000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.702000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.702000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.680264 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 01:46:32.685683 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 01:46:32.685738 systemd[1]: Stopped dracut-cmdline.service. Dec 13 01:46:32.687810 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 01:46:32.687856 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 01:46:32.690897 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 01:46:32.694662 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 01:46:32.694723 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 01:46:32.700067 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 01:46:32.700162 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 01:46:32.736573 kernel: hv_netvsc 7c1e5221-30c4-7c1e-5221-30c47c1e5221 eth0: Data path switched from VF: enP44134s1 Dec 13 01:46:32.753287 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 01:46:32.758000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:32.753405 systemd[1]: Stopped network-cleanup.service. Dec 13 01:46:33.002197 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 01:46:33.002333 systemd[1]: Stopped sysroot-boot.service. Dec 13 01:46:33.008000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:33.009135 systemd[1]: Reached target initrd-switch-root.target. Dec 13 01:46:33.014299 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 01:46:33.014382 systemd[1]: Stopped initrd-setup-root.service. Dec 13 01:46:33.019000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:33.020465 systemd[1]: Starting initrd-switch-root.service... Dec 13 01:46:33.033161 systemd[1]: Switching root. Dec 13 01:46:33.056822 systemd-journald[183]: Journal stopped Dec 13 01:46:50.294887 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Dec 13 01:46:50.294932 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 01:46:50.295032 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 01:46:50.295049 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 01:46:50.295063 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 01:46:50.295075 kernel: SELinux: policy capability open_perms=1 Dec 13 01:46:50.295092 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 01:46:50.295101 kernel: SELinux: policy capability always_check_network=0 Dec 13 01:46:50.295113 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 01:46:50.295121 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 01:46:50.295137 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 01:46:50.295149 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 01:46:50.295159 kernel: kauditd_printk_skb: 42 callbacks suppressed Dec 13 01:46:50.295168 kernel: audit: type=1403 audit(1734054395.846:81): auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:46:50.295181 systemd[1]: Successfully loaded SELinux policy in 326.953ms. Dec 13 01:46:50.295194 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 26.764ms. Dec 13 01:46:50.295208 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:46:50.295219 systemd[1]: Detected virtualization microsoft. Dec 13 01:46:50.295234 systemd[1]: Detected architecture x86-64. Dec 13 01:46:50.295245 systemd[1]: Detected first boot. Dec 13 01:46:50.295256 systemd[1]: Hostname set to . Dec 13 01:46:50.295267 systemd[1]: Initializing machine ID from random generator. Dec 13 01:46:50.295279 kernel: audit: type=1400 audit(1734054396.725:82): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:46:50.295289 kernel: audit: type=1400 audit(1734054396.742:83): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:46:50.295299 kernel: audit: type=1400 audit(1734054396.742:84): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:46:50.295311 kernel: audit: type=1334 audit(1734054396.768:85): prog-id=10 op=LOAD Dec 13 01:46:50.295324 kernel: audit: type=1334 audit(1734054396.768:86): prog-id=10 op=UNLOAD Dec 13 01:46:50.295333 kernel: audit: type=1334 audit(1734054396.773:87): prog-id=11 op=LOAD Dec 13 01:46:50.295342 kernel: audit: type=1334 audit(1734054396.773:88): prog-id=11 op=UNLOAD Dec 13 01:46:50.295353 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 01:46:50.295364 kernel: audit: type=1400 audit(1734054398.549:89): avc: denied { associate } for pid=1031 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:46:50.295375 kernel: audit: type=1300 audit(1734054398.549:89): arch=c000003e syscall=188 success=yes exit=0 a0=c00018e7d2 a1=c00018aa80 a2=c00019ccc0 a3=32 items=0 ppid=1014 pid=1031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:46:50.295388 systemd[1]: Populated /etc with preset unit settings. Dec 13 01:46:50.295400 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:46:50.295416 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:46:50.295427 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:46:50.295437 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 01:46:50.295447 kernel: audit: type=1334 audit(1734054409.708:91): prog-id=12 op=LOAD Dec 13 01:46:50.295457 kernel: audit: type=1334 audit(1734054409.708:92): prog-id=3 op=UNLOAD Dec 13 01:46:50.295469 kernel: audit: type=1334 audit(1734054409.713:93): prog-id=13 op=LOAD Dec 13 01:46:50.295482 kernel: audit: type=1334 audit(1734054409.724:94): prog-id=14 op=LOAD Dec 13 01:46:50.295493 kernel: audit: type=1334 audit(1734054409.724:95): prog-id=4 op=UNLOAD Dec 13 01:46:50.295505 kernel: audit: type=1334 audit(1734054409.724:96): prog-id=5 op=UNLOAD Dec 13 01:46:50.295513 kernel: audit: type=1334 audit(1734054409.734:97): prog-id=15 op=LOAD Dec 13 01:46:50.295523 kernel: audit: type=1334 audit(1734054409.734:98): prog-id=12 op=UNLOAD Dec 13 01:46:50.295534 kernel: audit: type=1334 audit(1734054409.734:99): prog-id=16 op=LOAD Dec 13 01:46:50.295545 kernel: audit: type=1334 audit(1734054409.734:100): prog-id=17 op=LOAD Dec 13 01:46:50.295567 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 01:46:50.295582 systemd[1]: Stopped initrd-switch-root.service. Dec 13 01:46:50.295595 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 01:46:50.295605 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 01:46:50.295616 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 01:46:50.295627 systemd[1]: Created slice system-getty.slice. Dec 13 01:46:50.295641 systemd[1]: Created slice system-modprobe.slice. Dec 13 01:46:50.295650 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 01:46:50.295663 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 01:46:50.295677 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 01:46:50.295688 systemd[1]: Created slice user.slice. Dec 13 01:46:50.295697 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:46:50.295710 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 01:46:50.295722 systemd[1]: Set up automount boot.automount. Dec 13 01:46:50.295732 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 01:46:50.295742 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 01:46:50.295754 systemd[1]: Stopped target initrd-fs.target. Dec 13 01:46:50.295767 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 01:46:50.295779 systemd[1]: Reached target integritysetup.target. Dec 13 01:46:50.295792 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:46:50.295802 systemd[1]: Reached target remote-fs.target. Dec 13 01:46:50.295814 systemd[1]: Reached target slices.target. Dec 13 01:46:50.295823 systemd[1]: Reached target swap.target. Dec 13 01:46:50.295835 systemd[1]: Reached target torcx.target. Dec 13 01:46:50.295846 systemd[1]: Reached target veritysetup.target. Dec 13 01:46:50.295860 systemd[1]: Listening on systemd-coredump.socket. Dec 13 01:46:50.295870 systemd[1]: Listening on systemd-initctl.socket. Dec 13 01:46:50.295883 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:46:50.295896 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:46:50.295906 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:46:50.295921 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 01:46:50.295931 systemd[1]: Mounting dev-hugepages.mount... Dec 13 01:46:50.295943 systemd[1]: Mounting dev-mqueue.mount... Dec 13 01:46:50.295953 systemd[1]: Mounting media.mount... Dec 13 01:46:50.295966 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:50.295978 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 01:46:50.295988 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 01:46:50.295999 systemd[1]: Mounting tmp.mount... Dec 13 01:46:50.296011 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 01:46:50.296025 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:46:50.296035 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:46:50.296048 systemd[1]: Starting modprobe@configfs.service... Dec 13 01:46:50.296059 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:46:50.296071 systemd[1]: Starting modprobe@drm.service... Dec 13 01:46:50.296080 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:46:50.296093 systemd[1]: Starting modprobe@fuse.service... Dec 13 01:46:50.296104 systemd[1]: Starting modprobe@loop.service... Dec 13 01:46:50.296115 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 01:46:50.296133 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 01:46:50.296144 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 01:46:50.296156 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 01:46:50.296165 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 01:46:50.296178 systemd[1]: Stopped systemd-journald.service. Dec 13 01:46:50.296189 kernel: loop: module loaded Dec 13 01:46:50.296199 systemd[1]: Starting systemd-journald.service... Dec 13 01:46:50.296209 kernel: fuse: init (API version 7.34) Dec 13 01:46:50.296221 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:46:50.296236 systemd[1]: Starting systemd-network-generator.service... Dec 13 01:46:50.296246 systemd[1]: Starting systemd-remount-fs.service... Dec 13 01:46:50.296257 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:46:50.296268 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 01:46:50.296281 systemd[1]: Stopped verity-setup.service. Dec 13 01:46:50.296293 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:50.296305 systemd[1]: Mounted dev-hugepages.mount. Dec 13 01:46:50.296316 systemd[1]: Mounted dev-mqueue.mount. Dec 13 01:46:50.296330 systemd[1]: Mounted media.mount. Dec 13 01:46:50.296340 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 01:46:50.296353 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 01:46:50.296365 systemd[1]: Mounted tmp.mount. Dec 13 01:46:50.296380 systemd-journald[1129]: Journal started Dec 13 01:46:50.296438 systemd-journald[1129]: Runtime Journal (/run/log/journal/9ca311f22aa94b5d9679f7525a218153) is 8.0M, max 159.0M, 151.0M free. Dec 13 01:46:35.846000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:46:36.725000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:46:36.742000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:46:36.742000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:46:36.768000 audit: BPF prog-id=10 op=LOAD Dec 13 01:46:36.768000 audit: BPF prog-id=10 op=UNLOAD Dec 13 01:46:36.773000 audit: BPF prog-id=11 op=LOAD Dec 13 01:46:36.773000 audit: BPF prog-id=11 op=UNLOAD Dec 13 01:46:38.549000 audit[1031]: AVC avc: denied { associate } for pid=1031 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:46:38.549000 audit[1031]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c00018e7d2 a1=c00018aa80 a2=c00019ccc0 a3=32 items=0 ppid=1014 pid=1031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:46:38.549000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:46:38.557000 audit[1031]: AVC avc: denied { associate } for pid=1031 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:46:38.557000 audit[1031]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c00018e8a9 a2=1ed a3=0 items=2 ppid=1014 pid=1031 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:46:38.557000 audit: CWD cwd="/" Dec 13 01:46:38.557000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:38.557000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:38.557000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:46:49.708000 audit: BPF prog-id=12 op=LOAD Dec 13 01:46:49.708000 audit: BPF prog-id=3 op=UNLOAD Dec 13 01:46:49.713000 audit: BPF prog-id=13 op=LOAD Dec 13 01:46:49.724000 audit: BPF prog-id=14 op=LOAD Dec 13 01:46:49.724000 audit: BPF prog-id=4 op=UNLOAD Dec 13 01:46:49.724000 audit: BPF prog-id=5 op=UNLOAD Dec 13 01:46:49.734000 audit: BPF prog-id=15 op=LOAD Dec 13 01:46:49.734000 audit: BPF prog-id=12 op=UNLOAD Dec 13 01:46:49.734000 audit: BPF prog-id=16 op=LOAD Dec 13 01:46:49.734000 audit: BPF prog-id=17 op=LOAD Dec 13 01:46:49.734000 audit: BPF prog-id=13 op=UNLOAD Dec 13 01:46:49.734000 audit: BPF prog-id=14 op=UNLOAD Dec 13 01:46:49.744000 audit: BPF prog-id=18 op=LOAD Dec 13 01:46:49.744000 audit: BPF prog-id=15 op=UNLOAD Dec 13 01:46:49.754000 audit: BPF prog-id=19 op=LOAD Dec 13 01:46:49.763000 audit: BPF prog-id=20 op=LOAD Dec 13 01:46:49.763000 audit: BPF prog-id=16 op=UNLOAD Dec 13 01:46:49.763000 audit: BPF prog-id=17 op=UNLOAD Dec 13 01:46:49.764000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:49.777000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:49.777000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:49.783000 audit: BPF prog-id=18 op=UNLOAD Dec 13 01:46:50.144000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.156000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.162000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.162000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.163000 audit: BPF prog-id=21 op=LOAD Dec 13 01:46:50.163000 audit: BPF prog-id=22 op=LOAD Dec 13 01:46:50.163000 audit: BPF prog-id=23 op=LOAD Dec 13 01:46:50.163000 audit: BPF prog-id=19 op=UNLOAD Dec 13 01:46:50.163000 audit: BPF prog-id=20 op=UNLOAD Dec 13 01:46:50.252000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.290000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 01:46:50.290000 audit[1129]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffe31264800 a2=4000 a3=7ffe3126489c items=0 ppid=1 pid=1129 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:46:50.290000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 01:46:38.469932 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:46:49.707146 systemd[1]: Queued start job for default target multi-user.target. Dec 13 01:46:38.505525 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:46:49.764861 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 01:46:38.505585 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:46:38.505638 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 01:46:38.505650 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 01:46:38.505706 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 01:46:38.505727 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 01:46:38.505979 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 01:46:50.300818 systemd[1]: Started systemd-journald.service. Dec 13 01:46:38.506020 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:46:38.506034 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:46:38.533060 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 01:46:38.533119 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 01:46:38.533173 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 01:46:38.533201 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 01:46:38.533237 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 01:46:38.533263 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:38Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 01:46:48.381123 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:48Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:46:48.381387 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:48Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:46:48.381529 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:48Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:46:48.381717 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:48Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:46:48.381766 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:48Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 01:46:48.381819 /usr/lib/systemd/system-generators/torcx-generator[1031]: time="2024-12-13T01:46:48Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 01:46:50.306000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.307324 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 01:46:50.308000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.309751 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:46:50.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.314000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.314000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.312279 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 01:46:50.312444 systemd[1]: Finished modprobe@configfs.service. Dec 13 01:46:50.315010 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:46:50.315180 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:46:50.317859 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:46:50.318009 systemd[1]: Finished modprobe@drm.service. Dec 13 01:46:50.316000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.317000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.319000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.319000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.320671 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:46:50.320811 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:46:50.322000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.322000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.323683 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 01:46:50.323824 systemd[1]: Finished modprobe@fuse.service. Dec 13 01:46:50.325000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.325000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.326501 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:46:50.326658 systemd[1]: Finished modprobe@loop.service. Dec 13 01:46:50.328000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.328000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.329349 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:46:50.331000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.332489 systemd[1]: Finished systemd-network-generator.service. Dec 13 01:46:50.334000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.335655 systemd[1]: Finished systemd-remount-fs.service. Dec 13 01:46:50.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.338420 systemd[1]: Reached target network-pre.target. Dec 13 01:46:50.341792 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 01:46:50.347760 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 01:46:50.349946 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 01:46:50.369495 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 01:46:50.373817 systemd[1]: Starting systemd-journal-flush.service... Dec 13 01:46:50.377350 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:46:50.379039 systemd[1]: Starting systemd-random-seed.service... Dec 13 01:46:50.382449 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:46:50.384130 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:46:50.389194 systemd[1]: Starting systemd-sysusers.service... Dec 13 01:46:50.397118 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 01:46:50.399895 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 01:46:50.413153 systemd[1]: Finished systemd-random-seed.service. Dec 13 01:46:50.415000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.415903 systemd[1]: Reached target first-boot-complete.target. Dec 13 01:46:50.422315 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:46:50.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.428775 systemd-journald[1129]: Time spent on flushing to /var/log/journal/9ca311f22aa94b5d9679f7525a218153 is 23.951ms for 1165 entries. Dec 13 01:46:50.428775 systemd-journald[1129]: System Journal (/var/log/journal/9ca311f22aa94b5d9679f7525a218153) is 8.0M, max 2.6G, 2.6G free. Dec 13 01:46:50.547014 systemd-journald[1129]: Received client request to flush runtime journal. Dec 13 01:46:50.518000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:50.426309 systemd[1]: Starting systemd-udev-settle.service... Dec 13 01:46:50.516020 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:46:50.547426 udevadm[1156]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation-early.service, lvm2-activation.service not to pull it in. Dec 13 01:46:50.548412 systemd[1]: Finished systemd-journal-flush.service. Dec 13 01:46:50.551000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.196993 systemd[1]: Finished systemd-sysusers.service. Dec 13 01:46:51.199000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.967582 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 01:46:51.970000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.970000 audit: BPF prog-id=24 op=LOAD Dec 13 01:46:51.970000 audit: BPF prog-id=25 op=LOAD Dec 13 01:46:51.970000 audit: BPF prog-id=7 op=UNLOAD Dec 13 01:46:51.970000 audit: BPF prog-id=8 op=UNLOAD Dec 13 01:46:51.972032 systemd[1]: Starting systemd-udevd.service... Dec 13 01:46:51.990110 systemd-udevd[1158]: Using default interface naming scheme 'v252'. Dec 13 01:46:52.311349 systemd[1]: Started systemd-udevd.service. Dec 13 01:46:52.317000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:52.319000 audit: BPF prog-id=26 op=LOAD Dec 13 01:46:52.321766 systemd[1]: Starting systemd-networkd.service... Dec 13 01:46:52.354108 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 01:46:52.438831 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 01:46:52.439009 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 01:46:52.439029 kernel: hv_vmbus: registering driver hv_utils Dec 13 01:46:52.454809 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 01:46:52.454904 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 01:46:52.454932 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 01:46:53.047000 audit: BPF prog-id=27 op=LOAD Dec 13 01:46:53.047000 audit: BPF prog-id=28 op=LOAD Dec 13 01:46:53.047000 audit: BPF prog-id=29 op=LOAD Dec 13 01:46:53.050313 systemd[1]: Starting systemd-userdbd.service... Dec 13 01:46:53.083506 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 01:46:53.088465 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 01:46:53.088546 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 01:46:53.099893 kernel: Console: switching to colour dummy device 80x25 Dec 13 01:46:52.417000 audit[1174]: AVC avc: denied { confidentiality } for pid=1174 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:46:53.107812 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 01:46:53.107900 kernel: hv_vmbus: registering driver hv_balloon Dec 13 01:46:53.108476 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 01:46:52.417000 audit[1174]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5606834a2140 a1=f884 a2=7fb846aa9bc5 a3=5 items=12 ppid=1158 pid=1174 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:46:52.417000 audit: CWD cwd="/" Dec 13 01:46:52.417000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=1 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=2 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:53.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:53.126468 systemd[1]: Started systemd-userdbd.service. Dec 13 01:46:52.417000 audit: PATH item=3 name=(null) inode=15243 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=4 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=5 name=(null) inode=15244 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=6 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=7 name=(null) inode=15245 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=8 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=9 name=(null) inode=15246 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=10 name=(null) inode=15242 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PATH item=11 name=(null) inode=15247 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:46:52.417000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 01:46:53.313999 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Dec 13 01:46:53.388481 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1175) Dec 13 01:46:53.417848 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:46:53.441818 systemd[1]: Finished systemd-udev-settle.service. Dec 13 01:46:53.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:53.446232 systemd[1]: Starting lvm2-activation-early.service... Dec 13 01:46:53.558636 systemd-networkd[1171]: lo: Link UP Dec 13 01:46:53.558647 systemd-networkd[1171]: lo: Gained carrier Dec 13 01:46:53.559218 systemd-networkd[1171]: Enumeration completed Dec 13 01:46:53.559359 systemd[1]: Started systemd-networkd.service. Dec 13 01:46:53.561000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:53.563906 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:46:53.587955 systemd-networkd[1171]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:46:53.639485 kernel: mlx5_core ac66:00:02.0 enP44134s1: Link up Dec 13 01:46:53.661479 kernel: hv_netvsc 7c1e5221-30c4-7c1e-5221-30c47c1e5221 eth0: Data path switched to VF: enP44134s1 Dec 13 01:46:53.662228 systemd-networkd[1171]: enP44134s1: Link UP Dec 13 01:46:53.662439 systemd-networkd[1171]: eth0: Link UP Dec 13 01:46:53.662458 systemd-networkd[1171]: eth0: Gained carrier Dec 13 01:46:53.666761 systemd-networkd[1171]: enP44134s1: Gained carrier Dec 13 01:46:53.698603 systemd-networkd[1171]: eth0: DHCPv4 address 10.200.8.4/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:46:53.837907 lvm[1234]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:46:53.887624 systemd[1]: Finished lvm2-activation-early.service. Dec 13 01:46:53.889000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:53.890786 systemd[1]: Reached target cryptsetup.target. Dec 13 01:46:53.894583 systemd[1]: Starting lvm2-activation.service... Dec 13 01:46:53.899525 lvm[1236]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:46:53.949664 systemd[1]: Finished lvm2-activation.service. Dec 13 01:46:53.950000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:53.952434 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:46:53.954905 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 01:46:53.954942 systemd[1]: Reached target local-fs.target. Dec 13 01:46:53.957267 systemd[1]: Reached target machines.target. Dec 13 01:46:53.960878 systemd[1]: Starting ldconfig.service... Dec 13 01:46:53.963061 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:46:53.963183 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:46:53.964399 systemd[1]: Starting systemd-boot-update.service... Dec 13 01:46:53.967792 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 01:46:53.971977 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 01:46:53.975793 systemd[1]: Starting systemd-sysext.service... Dec 13 01:46:54.438191 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1238 (bootctl) Dec 13 01:46:54.439964 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 01:46:54.489534 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 01:46:54.492000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.523011 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 01:46:54.568340 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 01:46:54.568645 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 01:46:54.582468 kernel: loop0: detected capacity change from 0 to 211296 Dec 13 01:46:54.612470 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 01:46:54.627477 kernel: loop1: detected capacity change from 0 to 211296 Dec 13 01:46:54.633600 (sd-sysext)[1250]: Using extensions 'kubernetes'. Dec 13 01:46:54.635144 (sd-sysext)[1250]: Merged extensions into '/usr'. Dec 13 01:46:54.653144 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:54.681000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.681000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.684000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.687000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.687000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.692000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.659583 systemd[1]: Mounting usr-share-oem.mount... Dec 13 01:46:54.662843 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:46:54.664709 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:46:54.668569 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:46:54.672348 systemd[1]: Starting modprobe@loop.service... Dec 13 01:46:54.674331 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:46:54.674496 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:46:54.674631 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:54.677199 systemd[1]: Mounted usr-share-oem.mount. Dec 13 01:46:54.679911 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:46:54.680028 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:46:54.682808 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:46:54.682920 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:46:54.685806 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:46:54.685914 systemd[1]: Finished modprobe@loop.service. Dec 13 01:46:54.688719 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:46:54.688858 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:46:54.690064 systemd[1]: Finished systemd-sysext.service. Dec 13 01:46:54.695162 systemd[1]: Starting ensure-sysext.service... Dec 13 01:46:54.697500 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 01:46:54.707016 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 01:46:54.709182 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 01:46:54.707000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.710583 systemd[1]: Reloading. Dec 13 01:46:54.784146 /usr/lib/systemd/system-generators/torcx-generator[1285]: time="2024-12-13T01:46:54Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:46:54.784187 /usr/lib/systemd/system-generators/torcx-generator[1285]: time="2024-12-13T01:46:54Z" level=info msg="torcx already run" Dec 13 01:46:54.869992 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:46:54.870013 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:46:54.881833 systemd-tmpfiles[1257]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 01:46:54.886744 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:46:54.951000 audit: BPF prog-id=30 op=LOAD Dec 13 01:46:54.951000 audit: BPF prog-id=27 op=UNLOAD Dec 13 01:46:54.951000 audit: BPF prog-id=31 op=LOAD Dec 13 01:46:54.951000 audit: BPF prog-id=32 op=LOAD Dec 13 01:46:54.951000 audit: BPF prog-id=28 op=UNLOAD Dec 13 01:46:54.951000 audit: BPF prog-id=29 op=UNLOAD Dec 13 01:46:54.953000 audit: BPF prog-id=33 op=LOAD Dec 13 01:46:54.953000 audit: BPF prog-id=21 op=UNLOAD Dec 13 01:46:54.953000 audit: BPF prog-id=34 op=LOAD Dec 13 01:46:54.953000 audit: BPF prog-id=35 op=LOAD Dec 13 01:46:54.953000 audit: BPF prog-id=22 op=UNLOAD Dec 13 01:46:54.953000 audit: BPF prog-id=23 op=UNLOAD Dec 13 01:46:54.954000 audit: BPF prog-id=36 op=LOAD Dec 13 01:46:54.954000 audit: BPF prog-id=37 op=LOAD Dec 13 01:46:54.954000 audit: BPF prog-id=24 op=UNLOAD Dec 13 01:46:54.954000 audit: BPF prog-id=25 op=UNLOAD Dec 13 01:46:54.956000 audit: BPF prog-id=38 op=LOAD Dec 13 01:46:54.956000 audit: BPF prog-id=26 op=UNLOAD Dec 13 01:46:54.970399 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:54.970704 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:46:54.972096 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:46:54.975559 systemd-networkd[1171]: eth0: Gained IPv6LL Dec 13 01:46:54.977180 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:46:54.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.982000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.982000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.981214 systemd[1]: Starting modprobe@loop.service... Dec 13 01:46:54.982365 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:46:54.982546 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:46:54.982702 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:54.983909 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:46:54.984084 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:46:54.985470 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:46:54.985584 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:46:54.986376 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:46:54.987897 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:54.988141 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:46:54.991132 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:46:54.994650 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:46:54.997258 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:46:54.997418 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:46:54.997571 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:54.998363 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:46:55.000000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.001755 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:46:55.001903 systemd[1]: Finished modprobe@loop.service. Dec 13 01:46:55.003000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.003000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.004735 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:46:55.004893 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:46:55.006000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.006000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.008066 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:46:55.008215 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:46:55.010000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.010000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.011419 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:46:55.011603 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:46:55.014456 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:55.014793 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:46:55.016349 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:46:55.019938 systemd[1]: Starting modprobe@drm.service... Dec 13 01:46:55.023558 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:46:55.027033 systemd[1]: Starting modprobe@loop.service... Dec 13 01:46:55.029261 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:46:55.029504 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:46:55.029713 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:46:55.030750 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:46:55.030909 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:46:55.032000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.032000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.033932 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:46:55.034079 systemd[1]: Finished modprobe@drm.service. Dec 13 01:46:55.036000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.036000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.037201 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:46:55.037348 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:46:55.039000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.039000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.040589 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:46:55.040735 systemd[1]: Finished modprobe@loop.service. Dec 13 01:46:55.042000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.042000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.043634 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:46:55.043761 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:46:55.045135 systemd[1]: Finished ensure-sysext.service. Dec 13 01:46:55.047000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.054701 systemd-tmpfiles[1257]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 01:46:55.182600 systemd-tmpfiles[1257]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 01:46:55.379992 systemd-fsck[1245]: fsck.fat 4.2 (2021-01-31) Dec 13 01:46:55.379992 systemd-fsck[1245]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 01:46:55.382272 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 01:46:55.404272 kernel: kauditd_printk_skb: 126 callbacks suppressed Dec 13 01:46:55.404361 kernel: audit: type=1130 audit(1734054415.384:210): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.384000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.387678 systemd[1]: Mounting boot.mount... Dec 13 01:46:55.407830 systemd[1]: Mounted boot.mount. Dec 13 01:46:55.422996 systemd[1]: Finished systemd-boot-update.service. Dec 13 01:46:55.424000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.437472 kernel: audit: type=1130 audit(1734054415.424:211): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.066253 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 01:46:56.067000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.070756 systemd[1]: Starting audit-rules.service... Dec 13 01:46:56.082469 kernel: audit: type=1130 audit(1734054416.067:212): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.085493 systemd[1]: Starting clean-ca-certificates.service... Dec 13 01:46:56.092000 audit: BPF prog-id=39 op=LOAD Dec 13 01:46:56.089659 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 01:46:56.095657 systemd[1]: Starting systemd-resolved.service... Dec 13 01:46:56.099469 kernel: audit: type=1334 audit(1734054416.092:213): prog-id=39 op=LOAD Dec 13 01:46:56.100000 audit: BPF prog-id=40 op=LOAD Dec 13 01:46:56.103194 systemd[1]: Starting systemd-timesyncd.service... Dec 13 01:46:56.106478 kernel: audit: type=1334 audit(1734054416.100:214): prog-id=40 op=LOAD Dec 13 01:46:56.109158 systemd[1]: Starting systemd-update-utmp.service... Dec 13 01:46:56.154000 audit[1359]: SYSTEM_BOOT pid=1359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.171132 kernel: audit: type=1127 audit(1734054416.154:215): pid=1359 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.177522 systemd[1]: Finished systemd-update-utmp.service. Dec 13 01:46:56.195310 kernel: audit: type=1130 audit(1734054416.178:216): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.178000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.194236 systemd[1]: Finished clean-ca-certificates.service. Dec 13 01:46:56.196795 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:46:56.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.213470 kernel: audit: type=1130 audit(1734054416.195:217): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.221897 systemd[1]: Started systemd-timesyncd.service. Dec 13 01:46:56.240116 kernel: audit: type=1130 audit(1734054416.222:218): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.222000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.224544 systemd[1]: Reached target time-set.target. Dec 13 01:46:56.288741 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 01:46:56.290000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.307477 kernel: audit: type=1130 audit(1734054416.290:219): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.352072 systemd-resolved[1356]: Positive Trust Anchors: Dec 13 01:46:56.352097 systemd-resolved[1356]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:46:56.352136 systemd-resolved[1356]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:46:56.431378 systemd-timesyncd[1358]: Contacted time server 188.125.64.6:123 (0.flatcar.pool.ntp.org). Dec 13 01:46:56.431650 systemd-timesyncd[1358]: Initial clock synchronization to Fri 2024-12-13 01:46:56.429040 UTC. Dec 13 01:46:56.490632 systemd-resolved[1356]: Using system hostname 'ci-3510.3.6-a-04a43feb01'. Dec 13 01:46:56.492613 systemd[1]: Started systemd-resolved.service. Dec 13 01:46:56.494000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:56.495522 systemd[1]: Reached target network.target. Dec 13 01:46:56.498100 systemd[1]: Reached target network-online.target. Dec 13 01:46:56.500734 systemd[1]: Reached target nss-lookup.target. Dec 13 01:46:56.582000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:46:56.582000 audit[1374]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdecb6b980 a2=420 a3=0 items=0 ppid=1353 pid=1374 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:46:56.582000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 01:46:56.584217 augenrules[1374]: No rules Dec 13 01:46:56.584825 systemd[1]: Finished audit-rules.service. Dec 13 01:47:03.153888 ldconfig[1237]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 01:47:03.164338 systemd[1]: Finished ldconfig.service. Dec 13 01:47:03.168996 systemd[1]: Starting systemd-update-done.service... Dec 13 01:47:03.189602 systemd[1]: Finished systemd-update-done.service. Dec 13 01:47:03.192587 systemd[1]: Reached target sysinit.target. Dec 13 01:47:03.195138 systemd[1]: Started motdgen.path. Dec 13 01:47:03.197125 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 01:47:03.200308 systemd[1]: Started logrotate.timer. Dec 13 01:47:03.202373 systemd[1]: Started mdadm.timer. Dec 13 01:47:03.204278 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 01:47:03.206606 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 01:47:03.206649 systemd[1]: Reached target paths.target. Dec 13 01:47:03.208867 systemd[1]: Reached target timers.target. Dec 13 01:47:03.212499 systemd[1]: Listening on dbus.socket. Dec 13 01:47:03.216149 systemd[1]: Starting docker.socket... Dec 13 01:47:03.221037 systemd[1]: Listening on sshd.socket. Dec 13 01:47:03.223792 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:03.224284 systemd[1]: Listening on docker.socket. Dec 13 01:47:03.227002 systemd[1]: Reached target sockets.target. Dec 13 01:47:03.229415 systemd[1]: Reached target basic.target. Dec 13 01:47:03.231456 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:47:03.231499 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:47:03.232606 systemd[1]: Starting containerd.service... Dec 13 01:47:03.236115 systemd[1]: Starting dbus.service... Dec 13 01:47:03.239341 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 01:47:03.242925 systemd[1]: Starting extend-filesystems.service... Dec 13 01:47:03.245308 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 01:47:03.264809 systemd[1]: Starting kubelet.service... Dec 13 01:47:03.268314 systemd[1]: Starting motdgen.service... Dec 13 01:47:03.271599 systemd[1]: Started nvidia.service. Dec 13 01:47:03.276067 systemd[1]: Starting prepare-helm.service... Dec 13 01:47:03.279539 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 01:47:03.283552 systemd[1]: Starting sshd-keygen.service... Dec 13 01:47:03.289625 systemd[1]: Starting systemd-logind.service... Dec 13 01:47:03.291983 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:03.292081 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 01:47:03.292686 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 01:47:03.295688 systemd[1]: Starting update-engine.service... Dec 13 01:47:03.299170 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 01:47:03.302401 jq[1399]: true Dec 13 01:47:03.309469 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 01:47:03.309765 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 01:47:03.312062 jq[1384]: false Dec 13 01:47:03.314211 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 01:47:03.314514 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 01:47:03.341182 jq[1406]: true Dec 13 01:47:03.356401 extend-filesystems[1385]: Found loop1 Dec 13 01:47:03.358973 extend-filesystems[1385]: Found sda Dec 13 01:47:03.360730 extend-filesystems[1385]: Found sda1 Dec 13 01:47:03.360730 extend-filesystems[1385]: Found sda2 Dec 13 01:47:03.360730 extend-filesystems[1385]: Found sda3 Dec 13 01:47:03.360730 extend-filesystems[1385]: Found usr Dec 13 01:47:03.360730 extend-filesystems[1385]: Found sda4 Dec 13 01:47:03.360730 extend-filesystems[1385]: Found sda6 Dec 13 01:47:03.360730 extend-filesystems[1385]: Found sda7 Dec 13 01:47:03.360730 extend-filesystems[1385]: Found sda9 Dec 13 01:47:03.360730 extend-filesystems[1385]: Checking size of /dev/sda9 Dec 13 01:47:03.386489 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 01:47:03.386748 systemd[1]: Finished motdgen.service. Dec 13 01:47:03.430917 env[1410]: time="2024-12-13T01:47:03.429988640Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 01:47:03.448389 extend-filesystems[1385]: Old size kept for /dev/sda9 Dec 13 01:47:03.456385 extend-filesystems[1385]: Found sr0 Dec 13 01:47:03.459600 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 01:47:03.459825 systemd[1]: Finished extend-filesystems.service. Dec 13 01:47:03.501396 systemd-logind[1397]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 01:47:03.502280 systemd-logind[1397]: New seat seat0. Dec 13 01:47:03.503984 tar[1404]: linux-amd64/helm Dec 13 01:47:03.507691 dbus-daemon[1383]: [system] SELinux support is enabled Dec 13 01:47:03.507874 systemd[1]: Started dbus.service. Dec 13 01:47:03.513392 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 01:47:03.513422 systemd[1]: Reached target system-config.target. Dec 13 01:47:03.516405 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 01:47:03.516428 systemd[1]: Reached target user-config.target. Dec 13 01:47:03.523655 systemd[1]: Started systemd-logind.service. Dec 13 01:47:03.560335 bash[1435]: Updated "/home/core/.ssh/authorized_keys" Dec 13 01:47:03.561330 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 01:47:03.633039 env[1410]: time="2024-12-13T01:47:03.632979616Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 01:47:03.633400 env[1410]: time="2024-12-13T01:47:03.633367780Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:03.635140 env[1410]: time="2024-12-13T01:47:03.635100421Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:47:03.638513 env[1410]: time="2024-12-13T01:47:03.638481911Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:03.638923 env[1410]: time="2024-12-13T01:47:03.638892973Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:47:03.639025 env[1410]: time="2024-12-13T01:47:03.639009063Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:03.639108 env[1410]: time="2024-12-13T01:47:03.639093155Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 01:47:03.639164 env[1410]: time="2024-12-13T01:47:03.639153050Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:03.639314 env[1410]: time="2024-12-13T01:47:03.639297136Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:03.645287 env[1410]: time="2024-12-13T01:47:03.645259689Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:03.645665 env[1410]: time="2024-12-13T01:47:03.645638754Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:47:03.645767 env[1410]: time="2024-12-13T01:47:03.645753444Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 01:47:03.645930 env[1410]: time="2024-12-13T01:47:03.645900630Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 01:47:03.646014 env[1410]: time="2024-12-13T01:47:03.646001321Z" level=info msg="metadata content store policy set" policy=shared Dec 13 01:47:03.658806 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665604623Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665655618Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665675516Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665728311Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665750009Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665813104Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665830402Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665847200Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665865199Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665882797Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665901595Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.665919994Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.666056981Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 01:47:03.666511 env[1410]: time="2024-12-13T01:47:03.666144473Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667200276Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667245572Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667264270Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667332064Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667350862Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667367761Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667441754Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667504948Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667522647Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667536745Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667551844Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667569742Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667721228Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667741127Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.668652 env[1410]: time="2024-12-13T01:47:03.667758425Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.669214 env[1410]: time="2024-12-13T01:47:03.667775323Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 01:47:03.669214 env[1410]: time="2024-12-13T01:47:03.667817620Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 01:47:03.669214 env[1410]: time="2024-12-13T01:47:03.667834218Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 01:47:03.669214 env[1410]: time="2024-12-13T01:47:03.667855616Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 01:47:03.669214 env[1410]: time="2024-12-13T01:47:03.667895013Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 01:47:03.669402 env[1410]: time="2024-12-13T01:47:03.668179786Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 01:47:03.669402 env[1410]: time="2024-12-13T01:47:03.668256479Z" level=info msg="Connect containerd service" Dec 13 01:47:03.669402 env[1410]: time="2024-12-13T01:47:03.668294476Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.669933525Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.670226499Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.670278494Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.676754400Z" level=info msg="Start subscribing containerd event" Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.676825393Z" level=info msg="Start recovering state" Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.676912285Z" level=info msg="Start event monitor" Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.676934683Z" level=info msg="Start snapshots syncer" Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.676948582Z" level=info msg="Start cni network conf syncer for default" Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.676963580Z" level=info msg="Start streaming server" Dec 13 01:47:03.704320 env[1410]: time="2024-12-13T01:47:03.678088577Z" level=info msg="containerd successfully booted in 0.249036s" Dec 13 01:47:03.670405 systemd[1]: Started containerd.service. Dec 13 01:47:04.209430 sshd_keygen[1405]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 01:47:04.227267 update_engine[1398]: I1213 01:47:04.226701 1398 main.cc:92] Flatcar Update Engine starting Dec 13 01:47:04.246361 systemd[1]: Finished sshd-keygen.service. Dec 13 01:47:04.250904 systemd[1]: Starting issuegen.service... Dec 13 01:47:04.254804 systemd[1]: Started waagent.service. Dec 13 01:47:04.268785 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 01:47:04.268987 systemd[1]: Finished issuegen.service. Dec 13 01:47:04.273429 systemd[1]: Starting systemd-user-sessions.service... Dec 13 01:47:04.281404 systemd[1]: Started update-engine.service. Dec 13 01:47:04.281691 update_engine[1398]: I1213 01:47:04.281582 1398 update_check_scheduler.cc:74] Next update check in 11m43s Dec 13 01:47:04.286300 systemd[1]: Started locksmithd.service. Dec 13 01:47:04.291369 systemd[1]: Finished systemd-user-sessions.service. Dec 13 01:47:04.296342 systemd[1]: Started getty@tty1.service. Dec 13 01:47:04.300903 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 01:47:04.304755 systemd[1]: Reached target getty.target. Dec 13 01:47:04.415253 tar[1404]: linux-amd64/LICENSE Dec 13 01:47:04.415253 tar[1404]: linux-amd64/README.md Dec 13 01:47:04.421429 systemd[1]: Finished prepare-helm.service. Dec 13 01:47:04.628575 systemd[1]: Started kubelet.service. Dec 13 01:47:04.631726 systemd[1]: Reached target multi-user.target. Dec 13 01:47:04.635936 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 01:47:04.646363 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 01:47:04.646569 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 01:47:04.649797 systemd[1]: Startup finished in 823ms (firmware) + 30.322s (loader) + 953ms (kernel) + 14.526s (initrd) + 28.822s (userspace) = 1min 15.449s. Dec 13 01:47:05.037792 login[1503]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 01:47:05.040154 login[1504]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 01:47:05.069502 systemd[1]: Created slice user-500.slice. Dec 13 01:47:05.070990 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 01:47:05.082349 systemd-logind[1397]: New session 2 of user core. Dec 13 01:47:05.086444 systemd-logind[1397]: New session 1 of user core. Dec 13 01:47:05.092047 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 01:47:05.094081 systemd[1]: Starting user@500.service... Dec 13 01:47:05.114075 (systemd)[1520]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:47:05.261330 kubelet[1508]: E1213 01:47:05.261263 1508 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:47:05.264691 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:47:05.264848 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:47:05.265184 systemd[1]: kubelet.service: Consumed 1.025s CPU time. Dec 13 01:47:05.301164 systemd[1520]: Queued start job for default target default.target. Dec 13 01:47:05.301780 systemd[1520]: Reached target paths.target. Dec 13 01:47:05.301808 systemd[1520]: Reached target sockets.target. Dec 13 01:47:05.301824 systemd[1520]: Reached target timers.target. Dec 13 01:47:05.301840 systemd[1520]: Reached target basic.target. Dec 13 01:47:05.301958 systemd[1]: Started user@500.service. Dec 13 01:47:05.303152 systemd[1]: Started session-1.scope. Dec 13 01:47:05.303995 systemd[1]: Started session-2.scope. Dec 13 01:47:05.304937 systemd[1520]: Reached target default.target. Dec 13 01:47:05.305127 systemd[1520]: Startup finished in 181ms. Dec 13 01:47:05.670646 locksmithd[1502]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 01:47:11.391924 waagent[1497]: 2024-12-13T01:47:11.391795Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 01:47:11.406439 waagent[1497]: 2024-12-13T01:47:11.394668Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 01:47:11.406439 waagent[1497]: 2024-12-13T01:47:11.395633Z INFO Daemon Daemon Python: 3.9.16 Dec 13 01:47:11.406439 waagent[1497]: 2024-12-13T01:47:11.396965Z INFO Daemon Daemon Run daemon Dec 13 01:47:11.406439 waagent[1497]: 2024-12-13T01:47:11.398501Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 01:47:11.410271 waagent[1497]: 2024-12-13T01:47:11.410145Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 01:47:11.418762 waagent[1497]: 2024-12-13T01:47:11.418654Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 01:47:11.424059 waagent[1497]: 2024-12-13T01:47:11.423993Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 01:47:11.426992 waagent[1497]: 2024-12-13T01:47:11.426926Z INFO Daemon Daemon Using waagent for provisioning Dec 13 01:47:11.435565 waagent[1497]: 2024-12-13T01:47:11.428646Z INFO Daemon Daemon Activate resource disk Dec 13 01:47:11.435565 waagent[1497]: 2024-12-13T01:47:11.430436Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 01:47:11.438099 waagent[1497]: 2024-12-13T01:47:11.438034Z INFO Daemon Daemon Found device: None Dec 13 01:47:11.469874 waagent[1497]: 2024-12-13T01:47:11.439252Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 01:47:11.469874 waagent[1497]: 2024-12-13T01:47:11.440172Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 01:47:11.469874 waagent[1497]: 2024-12-13T01:47:11.441975Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 01:47:11.469874 waagent[1497]: 2024-12-13T01:47:11.442795Z INFO Daemon Daemon Running default provisioning handler Dec 13 01:47:11.469874 waagent[1497]: 2024-12-13T01:47:11.452577Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 01:47:11.469874 waagent[1497]: 2024-12-13T01:47:11.455506Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 01:47:11.469874 waagent[1497]: 2024-12-13T01:47:11.456427Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 01:47:11.469874 waagent[1497]: 2024-12-13T01:47:11.457314Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 01:47:11.552089 waagent[1497]: 2024-12-13T01:47:11.548340Z INFO Daemon Daemon Successfully mounted dvd Dec 13 01:47:11.651670 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 01:47:11.674004 waagent[1497]: 2024-12-13T01:47:11.673876Z INFO Daemon Daemon Detect protocol endpoint Dec 13 01:47:11.690680 waagent[1497]: 2024-12-13T01:47:11.675479Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 01:47:11.690680 waagent[1497]: 2024-12-13T01:47:11.676639Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 01:47:11.690680 waagent[1497]: 2024-12-13T01:47:11.677592Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 01:47:11.690680 waagent[1497]: 2024-12-13T01:47:11.678969Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 01:47:11.690680 waagent[1497]: 2024-12-13T01:47:11.679835Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 01:47:11.879741 waagent[1497]: 2024-12-13T01:47:11.879665Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 01:47:11.889374 waagent[1497]: 2024-12-13T01:47:11.881620Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 01:47:11.889374 waagent[1497]: 2024-12-13T01:47:11.882300Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 01:47:12.391091 waagent[1497]: 2024-12-13T01:47:12.390939Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 01:47:12.401048 waagent[1497]: 2024-12-13T01:47:12.400969Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 01:47:12.406769 waagent[1497]: 2024-12-13T01:47:12.402496Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 01:47:12.486878 waagent[1497]: 2024-12-13T01:47:12.486754Z INFO Daemon Daemon Found private key matching thumbprint AB872016C03CCF4EB1D82BA5E5EA7851FA21F4E3 Dec 13 01:47:12.497934 waagent[1497]: 2024-12-13T01:47:12.488225Z INFO Daemon Daemon Certificate with thumbprint 1354B9DF1A7636F5309583753E5F153D5B29286C has no matching private key. Dec 13 01:47:12.497934 waagent[1497]: 2024-12-13T01:47:12.489427Z INFO Daemon Daemon Fetch goal state completed Dec 13 01:47:12.535088 waagent[1497]: 2024-12-13T01:47:12.535003Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 0988be85-ccc4-47dd-8d6d-32be210a2e55 New eTag: 6393810616480181525] Dec 13 01:47:12.543476 waagent[1497]: 2024-12-13T01:47:12.537011Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 01:47:12.550161 waagent[1497]: 2024-12-13T01:47:12.550103Z INFO Daemon Daemon Starting provisioning Dec 13 01:47:12.557696 waagent[1497]: 2024-12-13T01:47:12.551537Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 01:47:12.557696 waagent[1497]: 2024-12-13T01:47:12.552483Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-04a43feb01] Dec 13 01:47:12.589887 waagent[1497]: 2024-12-13T01:47:12.589733Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-04a43feb01] Dec 13 01:47:12.599443 waagent[1497]: 2024-12-13T01:47:12.591702Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 01:47:12.599443 waagent[1497]: 2024-12-13T01:47:12.592952Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 01:47:12.606335 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 01:47:12.606618 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 01:47:12.606692 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 01:47:12.607035 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:47:12.612496 systemd-networkd[1171]: eth0: DHCPv6 lease lost Dec 13 01:47:12.614064 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:47:12.614258 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:47:12.616816 systemd[1]: Starting systemd-networkd.service... Dec 13 01:47:12.648412 systemd-networkd[1561]: enP44134s1: Link UP Dec 13 01:47:12.648423 systemd-networkd[1561]: enP44134s1: Gained carrier Dec 13 01:47:12.649792 systemd-networkd[1561]: eth0: Link UP Dec 13 01:47:12.649800 systemd-networkd[1561]: eth0: Gained carrier Dec 13 01:47:12.650234 systemd-networkd[1561]: lo: Link UP Dec 13 01:47:12.650244 systemd-networkd[1561]: lo: Gained carrier Dec 13 01:47:12.650697 systemd-networkd[1561]: eth0: Gained IPv6LL Dec 13 01:47:12.650977 systemd-networkd[1561]: Enumeration completed Dec 13 01:47:12.651087 systemd[1]: Started systemd-networkd.service. Dec 13 01:47:12.653121 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:47:12.655819 waagent[1497]: 2024-12-13T01:47:12.653370Z INFO Daemon Daemon Create user account if not exists Dec 13 01:47:12.655819 waagent[1497]: 2024-12-13T01:47:12.655108Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 01:47:12.656284 waagent[1497]: 2024-12-13T01:47:12.656226Z INFO Daemon Daemon Configure sudoer Dec 13 01:47:12.657938 waagent[1497]: 2024-12-13T01:47:12.657882Z INFO Daemon Daemon Configure sshd Dec 13 01:47:12.658992 waagent[1497]: 2024-12-13T01:47:12.658940Z INFO Daemon Daemon Deploy ssh public key. Dec 13 01:47:12.663315 systemd-networkd[1561]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:47:12.710517 systemd-networkd[1561]: eth0: DHCPv4 address 10.200.8.4/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:47:12.713660 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:47:13.809021 waagent[1497]: 2024-12-13T01:47:13.808912Z INFO Daemon Daemon Provisioning complete Dec 13 01:47:13.826076 waagent[1497]: 2024-12-13T01:47:13.825996Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 01:47:13.829735 waagent[1497]: 2024-12-13T01:47:13.829660Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 01:47:13.847256 waagent[1497]: 2024-12-13T01:47:13.847172Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 01:47:14.115190 waagent[1570]: 2024-12-13T01:47:14.115019Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 01:47:14.115936 waagent[1570]: 2024-12-13T01:47:14.115865Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:47:14.116084 waagent[1570]: 2024-12-13T01:47:14.116027Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:47:14.127567 waagent[1570]: 2024-12-13T01:47:14.127491Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 01:47:14.127755 waagent[1570]: 2024-12-13T01:47:14.127694Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 01:47:14.190388 waagent[1570]: 2024-12-13T01:47:14.190260Z INFO ExtHandler ExtHandler Found private key matching thumbprint AB872016C03CCF4EB1D82BA5E5EA7851FA21F4E3 Dec 13 01:47:14.190647 waagent[1570]: 2024-12-13T01:47:14.190577Z INFO ExtHandler ExtHandler Certificate with thumbprint 1354B9DF1A7636F5309583753E5F153D5B29286C has no matching private key. Dec 13 01:47:14.190892 waagent[1570]: 2024-12-13T01:47:14.190840Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 01:47:14.204614 waagent[1570]: 2024-12-13T01:47:14.204556Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: 6ef70905-765f-4d9e-896d-b0d00fed6e5e New eTag: 6393810616480181525] Dec 13 01:47:14.205131 waagent[1570]: 2024-12-13T01:47:14.205073Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 01:47:14.303473 waagent[1570]: 2024-12-13T01:47:14.303318Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 01:47:14.328922 waagent[1570]: 2024-12-13T01:47:14.328839Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1570 Dec 13 01:47:14.332322 waagent[1570]: 2024-12-13T01:47:14.332252Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 01:47:14.333550 waagent[1570]: 2024-12-13T01:47:14.333492Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 01:47:14.429752 waagent[1570]: 2024-12-13T01:47:14.429635Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 01:47:14.430115 waagent[1570]: 2024-12-13T01:47:14.430048Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 01:47:14.438015 waagent[1570]: 2024-12-13T01:47:14.437961Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 01:47:14.438494 waagent[1570]: 2024-12-13T01:47:14.438416Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 01:47:14.439541 waagent[1570]: 2024-12-13T01:47:14.439478Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 01:47:14.440796 waagent[1570]: 2024-12-13T01:47:14.440736Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 01:47:14.441200 waagent[1570]: 2024-12-13T01:47:14.441144Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:47:14.441355 waagent[1570]: 2024-12-13T01:47:14.441306Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:47:14.441935 waagent[1570]: 2024-12-13T01:47:14.441876Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 01:47:14.442354 waagent[1570]: 2024-12-13T01:47:14.442296Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 01:47:14.443633 waagent[1570]: 2024-12-13T01:47:14.443573Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 01:47:14.443774 waagent[1570]: 2024-12-13T01:47:14.443697Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:47:14.444026 waagent[1570]: 2024-12-13T01:47:14.443975Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 01:47:14.444234 waagent[1570]: 2024-12-13T01:47:14.444181Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 01:47:14.444234 waagent[1570]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 01:47:14.444234 waagent[1570]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 01:47:14.444234 waagent[1570]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 01:47:14.444234 waagent[1570]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:47:14.444234 waagent[1570]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:47:14.444234 waagent[1570]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:47:14.446473 waagent[1570]: 2024-12-13T01:47:14.446234Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:47:14.448904 waagent[1570]: 2024-12-13T01:47:14.448832Z INFO EnvHandler ExtHandler Configure routes Dec 13 01:47:14.449058 waagent[1570]: 2024-12-13T01:47:14.449007Z INFO EnvHandler ExtHandler Gateway:None Dec 13 01:47:14.449193 waagent[1570]: 2024-12-13T01:47:14.449147Z INFO EnvHandler ExtHandler Routes:None Dec 13 01:47:14.450277 waagent[1570]: 2024-12-13T01:47:14.450221Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 01:47:14.450507 waagent[1570]: 2024-12-13T01:47:14.450438Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 01:47:14.450685 waagent[1570]: 2024-12-13T01:47:14.450628Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 01:47:14.461609 waagent[1570]: 2024-12-13T01:47:14.461555Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 01:47:14.462429 waagent[1570]: 2024-12-13T01:47:14.462362Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 01:47:14.464231 waagent[1570]: 2024-12-13T01:47:14.464177Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 01:47:14.504970 waagent[1570]: 2024-12-13T01:47:14.504900Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 01:47:14.534285 waagent[1570]: 2024-12-13T01:47:14.534173Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1561' Dec 13 01:47:14.635039 waagent[1570]: 2024-12-13T01:47:14.634947Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 01:47:14.635039 waagent[1570]: Executing ['ip', '-a', '-o', 'link']: Dec 13 01:47:14.635039 waagent[1570]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 01:47:14.635039 waagent[1570]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:21:30:c4 brd ff:ff:ff:ff:ff:ff Dec 13 01:47:14.635039 waagent[1570]: 3: enP44134s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:21:30:c4 brd ff:ff:ff:ff:ff:ff\ altname enP44134p0s2 Dec 13 01:47:14.635039 waagent[1570]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 01:47:14.635039 waagent[1570]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 01:47:14.635039 waagent[1570]: 2: eth0 inet 10.200.8.4/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 01:47:14.635039 waagent[1570]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 01:47:14.635039 waagent[1570]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 01:47:14.635039 waagent[1570]: 2: eth0 inet6 fe80::7e1e:52ff:fe21:30c4/64 scope link \ valid_lft forever preferred_lft forever Dec 13 01:47:14.808045 waagent[1570]: 2024-12-13T01:47:14.807912Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 01:47:14.849715 waagent[1497]: 2024-12-13T01:47:14.849600Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 01:47:14.854657 waagent[1497]: 2024-12-13T01:47:14.854594Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 01:47:15.515972 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 01:47:15.516237 systemd[1]: Stopped kubelet.service. Dec 13 01:47:15.516296 systemd[1]: kubelet.service: Consumed 1.025s CPU time. Dec 13 01:47:15.518185 systemd[1]: Starting kubelet.service... Dec 13 01:47:15.663275 systemd[1]: Started kubelet.service. Dec 13 01:47:15.918266 waagent[1605]: 2024-12-13T01:47:15.918110Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 01:47:15.918935 waagent[1605]: 2024-12-13T01:47:15.918867Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 01:47:15.919078 waagent[1605]: 2024-12-13T01:47:15.919026Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 01:47:15.919220 waagent[1605]: 2024-12-13T01:47:15.919174Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Dec 13 01:47:15.928836 waagent[1605]: 2024-12-13T01:47:15.928736Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 01:47:15.929226 waagent[1605]: 2024-12-13T01:47:15.929168Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:47:15.929389 waagent[1605]: 2024-12-13T01:47:15.929339Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:47:15.941041 waagent[1605]: 2024-12-13T01:47:15.940974Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 01:47:15.950764 waagent[1605]: 2024-12-13T01:47:15.950712Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 01:47:15.951684 waagent[1605]: 2024-12-13T01:47:15.951626Z INFO ExtHandler Dec 13 01:47:15.951831 waagent[1605]: 2024-12-13T01:47:15.951781Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: 919600f5-93f1-4ae0-822b-3ce101805c3e eTag: 6393810616480181525 source: Fabric] Dec 13 01:47:15.952531 waagent[1605]: 2024-12-13T01:47:15.952476Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 01:47:16.140289 waagent[1605]: 2024-12-13T01:47:16.140137Z INFO ExtHandler Dec 13 01:47:16.140583 waagent[1605]: 2024-12-13T01:47:16.140505Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 01:47:16.149682 waagent[1605]: 2024-12-13T01:47:16.149610Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 01:47:16.150421 waagent[1605]: 2024-12-13T01:47:16.150329Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 01:47:16.172612 kubelet[1615]: E1213 01:47:16.172510 1615 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:47:16.173635 waagent[1605]: 2024-12-13T01:47:16.173573Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 01:47:16.177022 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:47:16.177184 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:47:16.239575 waagent[1605]: 2024-12-13T01:47:16.239442Z INFO ExtHandler Downloaded certificate {'thumbprint': 'AB872016C03CCF4EB1D82BA5E5EA7851FA21F4E3', 'hasPrivateKey': True} Dec 13 01:47:16.240520 waagent[1605]: 2024-12-13T01:47:16.240425Z INFO ExtHandler Downloaded certificate {'thumbprint': '1354B9DF1A7636F5309583753E5F153D5B29286C', 'hasPrivateKey': False} Dec 13 01:47:16.241456 waagent[1605]: 2024-12-13T01:47:16.241386Z INFO ExtHandler Fetch goal state completed Dec 13 01:47:16.262199 waagent[1605]: 2024-12-13T01:47:16.262104Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 01:47:16.273299 waagent[1605]: 2024-12-13T01:47:16.273216Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1605 Dec 13 01:47:16.276284 waagent[1605]: 2024-12-13T01:47:16.276219Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 01:47:16.277226 waagent[1605]: 2024-12-13T01:47:16.277166Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 01:47:16.277521 waagent[1605]: 2024-12-13T01:47:16.277463Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 01:47:16.279465 waagent[1605]: 2024-12-13T01:47:16.279393Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 01:47:16.284020 waagent[1605]: 2024-12-13T01:47:16.283965Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 01:47:16.284407 waagent[1605]: 2024-12-13T01:47:16.284349Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 01:47:16.292361 waagent[1605]: 2024-12-13T01:47:16.292305Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 01:47:16.292822 waagent[1605]: 2024-12-13T01:47:16.292766Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 01:47:16.298617 waagent[1605]: 2024-12-13T01:47:16.298530Z INFO ExtHandler ExtHandler DROP rule is not available which implies no firewall rules are set yet. Environment thread will set it up. Dec 13 01:47:16.299636 waagent[1605]: 2024-12-13T01:47:16.299572Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 01:47:16.301421 waagent[1605]: 2024-12-13T01:47:16.301360Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 01:47:16.301840 waagent[1605]: 2024-12-13T01:47:16.301785Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:47:16.302003 waagent[1605]: 2024-12-13T01:47:16.301953Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:47:16.302566 waagent[1605]: 2024-12-13T01:47:16.302507Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 01:47:16.303343 waagent[1605]: 2024-12-13T01:47:16.303288Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 01:47:16.303925 waagent[1605]: 2024-12-13T01:47:16.303872Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:47:16.304344 waagent[1605]: 2024-12-13T01:47:16.304288Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 01:47:16.304344 waagent[1605]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 01:47:16.304344 waagent[1605]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 01:47:16.304344 waagent[1605]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 01:47:16.304344 waagent[1605]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:47:16.304344 waagent[1605]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:47:16.304344 waagent[1605]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:47:16.304866 waagent[1605]: 2024-12-13T01:47:16.304814Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:47:16.307135 waagent[1605]: 2024-12-13T01:47:16.307023Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 01:47:16.307980 waagent[1605]: 2024-12-13T01:47:16.307909Z INFO EnvHandler ExtHandler Configure routes Dec 13 01:47:16.308136 waagent[1605]: 2024-12-13T01:47:16.308086Z INFO EnvHandler ExtHandler Gateway:None Dec 13 01:47:16.308271 waagent[1605]: 2024-12-13T01:47:16.308226Z INFO EnvHandler ExtHandler Routes:None Dec 13 01:47:16.308716 waagent[1605]: 2024-12-13T01:47:16.308655Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 01:47:16.322419 waagent[1605]: 2024-12-13T01:47:16.321897Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 01:47:16.324192 waagent[1605]: 2024-12-13T01:47:16.321523Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 01:47:16.334287 waagent[1605]: 2024-12-13T01:47:16.334174Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 01:47:16.336254 waagent[1605]: 2024-12-13T01:47:16.336201Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 01:47:16.336254 waagent[1605]: Executing ['ip', '-a', '-o', 'link']: Dec 13 01:47:16.336254 waagent[1605]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 01:47:16.336254 waagent[1605]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:21:30:c4 brd ff:ff:ff:ff:ff:ff Dec 13 01:47:16.336254 waagent[1605]: 3: enP44134s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:21:30:c4 brd ff:ff:ff:ff:ff:ff\ altname enP44134p0s2 Dec 13 01:47:16.336254 waagent[1605]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 01:47:16.336254 waagent[1605]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 01:47:16.336254 waagent[1605]: 2: eth0 inet 10.200.8.4/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 01:47:16.336254 waagent[1605]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 01:47:16.336254 waagent[1605]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 01:47:16.336254 waagent[1605]: 2: eth0 inet6 fe80::7e1e:52ff:fe21:30c4/64 scope link \ valid_lft forever preferred_lft forever Dec 13 01:47:16.342554 waagent[1605]: 2024-12-13T01:47:16.342438Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 01:47:16.374855 waagent[1605]: 2024-12-13T01:47:16.374789Z INFO ExtHandler ExtHandler Dec 13 01:47:16.375380 waagent[1605]: 2024-12-13T01:47:16.375328Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: 83310875-0a41-439c-bf08-4f026f328cb6 correlation 87a91f1c-4c94-42e2-b90c-87cb8393b857 created: 2024-12-13T01:45:38.098587Z] Dec 13 01:47:16.376161 waagent[1605]: 2024-12-13T01:47:16.376102Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 01:47:16.378510 waagent[1605]: 2024-12-13T01:47:16.378303Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 3 ms] Dec 13 01:47:16.411172 waagent[1605]: 2024-12-13T01:47:16.411101Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 01:47:16.431910 waagent[1605]: 2024-12-13T01:47:16.431605Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: BE970B33-98AB-483F-9438-4D6ACFFD8F7D;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 01:47:16.445751 waagent[1605]: 2024-12-13T01:47:16.445647Z INFO EnvHandler ExtHandler Created firewall rules for the Azure Fabric: Dec 13 01:47:16.445751 waagent[1605]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:47:16.445751 waagent[1605]: pkts bytes target prot opt in out source destination Dec 13 01:47:16.445751 waagent[1605]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:47:16.445751 waagent[1605]: pkts bytes target prot opt in out source destination Dec 13 01:47:16.445751 waagent[1605]: Chain OUTPUT (policy ACCEPT 7 packets, 751 bytes) Dec 13 01:47:16.445751 waagent[1605]: pkts bytes target prot opt in out source destination Dec 13 01:47:16.445751 waagent[1605]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 01:47:16.445751 waagent[1605]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 01:47:16.445751 waagent[1605]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 01:47:16.452995 waagent[1605]: 2024-12-13T01:47:16.452893Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 01:47:16.452995 waagent[1605]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:47:16.452995 waagent[1605]: pkts bytes target prot opt in out source destination Dec 13 01:47:16.452995 waagent[1605]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:47:16.452995 waagent[1605]: pkts bytes target prot opt in out source destination Dec 13 01:47:16.452995 waagent[1605]: Chain OUTPUT (policy ACCEPT 7 packets, 751 bytes) Dec 13 01:47:16.452995 waagent[1605]: pkts bytes target prot opt in out source destination Dec 13 01:47:16.452995 waagent[1605]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 01:47:16.452995 waagent[1605]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 01:47:16.452995 waagent[1605]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 01:47:16.453577 waagent[1605]: 2024-12-13T01:47:16.453523Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 01:47:26.299096 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 01:47:26.299411 systemd[1]: Stopped kubelet.service. Dec 13 01:47:26.301516 systemd[1]: Starting kubelet.service... Dec 13 01:47:26.629479 systemd[1]: Started kubelet.service. Dec 13 01:47:26.926135 kubelet[1670]: E1213 01:47:26.926012 1670 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:47:26.928065 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:47:26.928180 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:47:37.049115 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 01:47:37.049478 systemd[1]: Stopped kubelet.service. Dec 13 01:47:37.051328 systemd[1]: Starting kubelet.service... Dec 13 01:47:37.262654 systemd[1]: Started kubelet.service. Dec 13 01:47:37.656055 kubelet[1682]: E1213 01:47:37.655998 1682 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:47:37.657908 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:47:37.658072 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:47:41.235146 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Dec 13 01:47:45.027156 systemd[1]: Created slice system-sshd.slice. Dec 13 01:47:45.029525 systemd[1]: Started sshd@0-10.200.8.4:22-10.200.16.10:32994.service. Dec 13 01:47:45.873203 sshd[1689]: Accepted publickey for core from 10.200.16.10 port 32994 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:47:45.874956 sshd[1689]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:47:45.879298 systemd-logind[1397]: New session 3 of user core. Dec 13 01:47:45.880728 systemd[1]: Started session-3.scope. Dec 13 01:47:46.426089 systemd[1]: Started sshd@1-10.200.8.4:22-10.200.16.10:33010.service. Dec 13 01:47:47.048131 sshd[1694]: Accepted publickey for core from 10.200.16.10 port 33010 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:47:47.050123 sshd[1694]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:47:47.055492 systemd[1]: Started session-4.scope. Dec 13 01:47:47.056113 systemd-logind[1397]: New session 4 of user core. Dec 13 01:47:47.497837 sshd[1694]: pam_unix(sshd:session): session closed for user core Dec 13 01:47:47.501232 systemd[1]: sshd@1-10.200.8.4:22-10.200.16.10:33010.service: Deactivated successfully. Dec 13 01:47:47.502319 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 01:47:47.502953 systemd-logind[1397]: Session 4 logged out. Waiting for processes to exit. Dec 13 01:47:47.503730 systemd-logind[1397]: Removed session 4. Dec 13 01:47:47.602479 systemd[1]: Started sshd@2-10.200.8.4:22-10.200.16.10:33016.service. Dec 13 01:47:47.799343 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 01:47:47.799661 systemd[1]: Stopped kubelet.service. Dec 13 01:47:47.801726 systemd[1]: Starting kubelet.service... Dec 13 01:47:47.965026 systemd[1]: Started kubelet.service. Dec 13 01:47:48.226190 sshd[1700]: Accepted publickey for core from 10.200.16.10 port 33016 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:47:48.227487 sshd[1700]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:47:48.232339 systemd[1]: Started session-5.scope. Dec 13 01:47:48.232976 systemd-logind[1397]: New session 5 of user core. Dec 13 01:47:48.431163 kubelet[1706]: E1213 01:47:48.431102 1706 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:47:48.432898 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:47:48.433014 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:47:48.663834 sshd[1700]: pam_unix(sshd:session): session closed for user core Dec 13 01:47:48.667406 systemd[1]: sshd@2-10.200.8.4:22-10.200.16.10:33016.service: Deactivated successfully. Dec 13 01:47:48.668389 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 01:47:48.669049 systemd-logind[1397]: Session 5 logged out. Waiting for processes to exit. Dec 13 01:47:48.669833 systemd-logind[1397]: Removed session 5. Dec 13 01:47:48.768534 systemd[1]: Started sshd@3-10.200.8.4:22-10.200.16.10:41848.service. Dec 13 01:47:49.347683 update_engine[1398]: I1213 01:47:49.347590 1398 update_attempter.cc:509] Updating boot flags... Dec 13 01:47:49.390778 sshd[1717]: Accepted publickey for core from 10.200.16.10 port 41848 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:47:49.392444 sshd[1717]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:47:49.398682 systemd[1]: Started session-6.scope. Dec 13 01:47:49.399299 systemd-logind[1397]: New session 6 of user core. Dec 13 01:47:49.839362 sshd[1717]: pam_unix(sshd:session): session closed for user core Dec 13 01:47:49.842636 systemd[1]: sshd@3-10.200.8.4:22-10.200.16.10:41848.service: Deactivated successfully. Dec 13 01:47:49.843673 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 01:47:49.844496 systemd-logind[1397]: Session 6 logged out. Waiting for processes to exit. Dec 13 01:47:49.845257 systemd-logind[1397]: Removed session 6. Dec 13 01:47:49.948104 systemd[1]: Started sshd@4-10.200.8.4:22-10.200.16.10:41850.service. Dec 13 01:47:50.569318 sshd[1789]: Accepted publickey for core from 10.200.16.10 port 41850 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:47:50.571066 sshd[1789]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:47:50.575843 systemd[1]: Started session-7.scope. Dec 13 01:47:50.576490 systemd-logind[1397]: New session 7 of user core. Dec 13 01:47:51.161742 sudo[1792]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 01:47:51.162060 sudo[1792]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:47:51.182682 dbus-daemon[1383]: \xd0-c\xb7\xbfU: received setenforce notice (enforcing=1878350944) Dec 13 01:47:51.184629 sudo[1792]: pam_unix(sudo:session): session closed for user root Dec 13 01:47:51.303084 sshd[1789]: pam_unix(sshd:session): session closed for user core Dec 13 01:47:51.306666 systemd[1]: sshd@4-10.200.8.4:22-10.200.16.10:41850.service: Deactivated successfully. Dec 13 01:47:51.307614 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 01:47:51.308277 systemd-logind[1397]: Session 7 logged out. Waiting for processes to exit. Dec 13 01:47:51.309133 systemd-logind[1397]: Removed session 7. Dec 13 01:47:51.409571 systemd[1]: Started sshd@5-10.200.8.4:22-10.200.16.10:41860.service. Dec 13 01:47:52.032467 sshd[1796]: Accepted publickey for core from 10.200.16.10 port 41860 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:47:52.034233 sshd[1796]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:47:52.040058 systemd[1]: Started session-8.scope. Dec 13 01:47:52.040516 systemd-logind[1397]: New session 8 of user core. Dec 13 01:47:52.376593 sudo[1800]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 01:47:52.376961 sudo[1800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:47:52.379897 sudo[1800]: pam_unix(sudo:session): session closed for user root Dec 13 01:47:52.385113 sudo[1799]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 01:47:52.385406 sudo[1799]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:47:52.395040 systemd[1]: Stopping audit-rules.service... Dec 13 01:47:52.396000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:47:52.399664 kernel: kauditd_printk_skb: 4 callbacks suppressed Dec 13 01:47:52.399751 kernel: audit: type=1305 audit(1734054472.396:222): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:47:52.399778 auditctl[1803]: No rules Dec 13 01:47:52.401726 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 01:47:52.401902 systemd[1]: Stopped audit-rules.service. Dec 13 01:47:52.403637 systemd[1]: Starting audit-rules.service... Dec 13 01:47:52.396000 audit[1803]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1fc9dc80 a2=420 a3=0 items=0 ppid=1 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:52.423392 kernel: audit: type=1300 audit(1734054472.396:222): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffd1fc9dc80 a2=420 a3=0 items=0 ppid=1 pid=1803 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:52.423529 kernel: audit: type=1327 audit(1734054472.396:222): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:47:52.396000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:47:52.427774 augenrules[1820]: No rules Dec 13 01:47:52.429601 kernel: audit: type=1131 audit(1734054472.401:223): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.401000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.428707 systemd[1]: Finished audit-rules.service. Dec 13 01:47:52.431409 sudo[1799]: pam_unix(sudo:session): session closed for user root Dec 13 01:47:52.428000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.451653 kernel: audit: type=1130 audit(1734054472.428:224): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.451745 kernel: audit: type=1106 audit(1734054472.431:225): pid=1799 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.431000 audit[1799]: USER_END pid=1799 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.431000 audit[1799]: CRED_DISP pid=1799 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.478710 kernel: audit: type=1104 audit(1734054472.431:226): pid=1799 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.536115 sshd[1796]: pam_unix(sshd:session): session closed for user core Dec 13 01:47:52.537000 audit[1796]: USER_END pid=1796 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:47:52.539710 systemd[1]: sshd@5-10.200.8.4:22-10.200.16.10:41860.service: Deactivated successfully. Dec 13 01:47:52.540490 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 01:47:52.541942 systemd-logind[1397]: Session 8 logged out. Waiting for processes to exit. Dec 13 01:47:52.542917 systemd-logind[1397]: Removed session 8. Dec 13 01:47:52.537000 audit[1796]: CRED_DISP pid=1796 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:47:52.567611 kernel: audit: type=1106 audit(1734054472.537:227): pid=1796 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:47:52.567696 kernel: audit: type=1104 audit(1734054472.537:228): pid=1796 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:47:52.567724 kernel: audit: type=1131 audit(1734054472.539:229): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.4:22-10.200.16.10:41860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.539000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.4:22-10.200.16.10:41860 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.640000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.4:22-10.200.16.10:41870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:52.640671 systemd[1]: Started sshd@6-10.200.8.4:22-10.200.16.10:41870.service. Dec 13 01:47:53.262000 audit[1826]: USER_ACCT pid=1826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:47:53.262986 sshd[1826]: Accepted publickey for core from 10.200.16.10 port 41870 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:47:53.263000 audit[1826]: CRED_ACQ pid=1826 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:47:53.263000 audit[1826]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffec4a7ed50 a2=3 a3=0 items=0 ppid=1 pid=1826 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:53.263000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:47:53.264704 sshd[1826]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:47:53.270349 systemd[1]: Started session-9.scope. Dec 13 01:47:53.270927 systemd-logind[1397]: New session 9 of user core. Dec 13 01:47:53.275000 audit[1826]: USER_START pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:47:53.277000 audit[1831]: CRED_ACQ pid=1831 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:47:53.606000 audit[1832]: USER_ACCT pid=1832 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.607236 sudo[1832]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 01:47:53.606000 audit[1832]: CRED_REFR pid=1832 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.607665 sudo[1832]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:47:53.609000 audit[1832]: USER_START pid=1832 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:47:53.646356 systemd[1]: Starting docker.service... Dec 13 01:47:53.700982 env[1842]: time="2024-12-13T01:47:53.700920628Z" level=info msg="Starting up" Dec 13 01:47:53.702287 env[1842]: time="2024-12-13T01:47:53.702259324Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:47:53.702414 env[1842]: time="2024-12-13T01:47:53.702402523Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:47:53.702521 env[1842]: time="2024-12-13T01:47:53.702500723Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:47:53.702597 env[1842]: time="2024-12-13T01:47:53.702584822Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:47:53.704846 env[1842]: time="2024-12-13T01:47:53.704814714Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:47:53.704846 env[1842]: time="2024-12-13T01:47:53.704835614Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:47:53.705008 env[1842]: time="2024-12-13T01:47:53.704859014Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:47:53.705008 env[1842]: time="2024-12-13T01:47:53.704871814Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:47:53.895497 env[1842]: time="2024-12-13T01:47:53.895361421Z" level=info msg="Loading containers: start." Dec 13 01:47:53.969000 audit[1869]: NETFILTER_CFG table=nat:8 family=2 entries=2 op=nft_register_chain pid=1869 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:53.969000 audit[1869]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffc957e22b0 a2=0 a3=7ffc957e229c items=0 ppid=1842 pid=1869 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:53.969000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 01:47:53.971000 audit[1871]: NETFILTER_CFG table=filter:9 family=2 entries=2 op=nft_register_chain pid=1871 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:53.971000 audit[1871]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffc169a9c70 a2=0 a3=7ffc169a9c5c items=0 ppid=1842 pid=1871 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:53.971000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 01:47:53.973000 audit[1873]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_chain pid=1873 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:53.973000 audit[1873]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fff7f7ea2c0 a2=0 a3=7fff7f7ea2ac items=0 ppid=1842 pid=1873 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:53.973000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:47:53.975000 audit[1875]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_chain pid=1875 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:53.975000 audit[1875]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffcac4b060 a2=0 a3=7fffcac4b04c items=0 ppid=1842 pid=1875 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:53.975000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:47:53.977000 audit[1877]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_rule pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:53.977000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffffff1d230 a2=0 a3=7ffffff1d21c items=0 ppid=1842 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:53.977000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 01:47:53.979000 audit[1879]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:53.979000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fffc4059750 a2=0 a3=7fffc405973c items=0 ppid=1842 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:53.979000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 01:47:53.998000 audit[1881]: NETFILTER_CFG table=filter:14 family=2 entries=1 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:53.998000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff77f68c40 a2=0 a3=7fff77f68c2c items=0 ppid=1842 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:53.998000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 01:47:54.000000 audit[1883]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_register_rule pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.000000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7ffcf7406bb0 a2=0 a3=7ffcf7406b9c items=0 ppid=1842 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.000000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 01:47:54.002000 audit[1885]: NETFILTER_CFG table=filter:16 family=2 entries=2 op=nft_register_chain pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.002000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffc7477ba50 a2=0 a3=7ffc7477ba3c items=0 ppid=1842 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.002000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:47:54.018000 audit[1889]: NETFILTER_CFG table=filter:17 family=2 entries=1 op=nft_unregister_rule pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.018000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd70e98200 a2=0 a3=7ffd70e981ec items=0 ppid=1842 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.018000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:47:54.023000 audit[1890]: NETFILTER_CFG table=filter:18 family=2 entries=1 op=nft_register_rule pid=1890 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.023000 audit[1890]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe16dbf4e0 a2=0 a3=7ffe16dbf4cc items=0 ppid=1842 pid=1890 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.023000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:47:54.065473 kernel: Initializing XFRM netlink socket Dec 13 01:47:54.104713 env[1842]: time="2024-12-13T01:47:54.104660882Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 01:47:54.180000 audit[1897]: NETFILTER_CFG table=nat:19 family=2 entries=2 op=nft_register_chain pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.180000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7ffc4b28c4c0 a2=0 a3=7ffc4b28c4ac items=0 ppid=1842 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.180000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 01:47:54.193000 audit[1900]: NETFILTER_CFG table=nat:20 family=2 entries=1 op=nft_register_rule pid=1900 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.193000 audit[1900]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7ffe4a404600 a2=0 a3=7ffe4a4045ec items=0 ppid=1842 pid=1900 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.193000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 01:47:54.196000 audit[1903]: NETFILTER_CFG table=filter:21 family=2 entries=1 op=nft_register_rule pid=1903 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.196000 audit[1903]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffc23975330 a2=0 a3=7ffc2397531c items=0 ppid=1842 pid=1903 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.196000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 01:47:54.198000 audit[1905]: NETFILTER_CFG table=filter:22 family=2 entries=1 op=nft_register_rule pid=1905 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.198000 audit[1905]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7fffe22d8380 a2=0 a3=7fffe22d836c items=0 ppid=1842 pid=1905 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.198000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 01:47:54.200000 audit[1907]: NETFILTER_CFG table=nat:23 family=2 entries=2 op=nft_register_chain pid=1907 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.200000 audit[1907]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd2a3a7a80 a2=0 a3=7ffd2a3a7a6c items=0 ppid=1842 pid=1907 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.200000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 01:47:54.202000 audit[1909]: NETFILTER_CFG table=nat:24 family=2 entries=2 op=nft_register_chain pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.202000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7fffa8029590 a2=0 a3=7fffa802957c items=0 ppid=1842 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.202000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 01:47:54.204000 audit[1911]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1911 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.204000 audit[1911]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffebd7717e0 a2=0 a3=7ffebd7717cc items=0 ppid=1842 pid=1911 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.204000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 01:47:54.207000 audit[1913]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1913 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.207000 audit[1913]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffc4c89fd10 a2=0 a3=7ffc4c89fcfc items=0 ppid=1842 pid=1913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.207000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 01:47:54.209000 audit[1915]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1915 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.209000 audit[1915]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffc978199b0 a2=0 a3=7ffc9781999c items=0 ppid=1842 pid=1915 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.209000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:47:54.211000 audit[1917]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_register_rule pid=1917 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.211000 audit[1917]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffc06f752d0 a2=0 a3=7ffc06f752bc items=0 ppid=1842 pid=1917 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.211000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:47:54.213000 audit[1919]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1919 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.213000 audit[1919]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffda0104ea0 a2=0 a3=7ffda0104e8c items=0 ppid=1842 pid=1919 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.213000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 01:47:54.214506 systemd-networkd[1561]: docker0: Link UP Dec 13 01:47:54.235000 audit[1923]: NETFILTER_CFG table=filter:30 family=2 entries=1 op=nft_unregister_rule pid=1923 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.235000 audit[1923]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7fff10236760 a2=0 a3=7fff1023674c items=0 ppid=1842 pid=1923 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.235000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:47:54.239000 audit[1924]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:47:54.239000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffe4658c660 a2=0 a3=7ffe4658c64c items=0 ppid=1842 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:54.239000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:47:54.240813 env[1842]: time="2024-12-13T01:47:54.240769918Z" level=info msg="Loading containers: done." Dec 13 01:47:54.252625 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck1423067219-merged.mount: Deactivated successfully. Dec 13 01:47:54.304080 env[1842]: time="2024-12-13T01:47:54.304009002Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 01:47:54.304330 env[1842]: time="2024-12-13T01:47:54.304280601Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 01:47:54.304432 env[1842]: time="2024-12-13T01:47:54.304408601Z" level=info msg="Daemon has completed initialization" Dec 13 01:47:54.335739 systemd[1]: Started docker.service. Dec 13 01:47:54.335000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:54.346166 env[1842]: time="2024-12-13T01:47:54.346108558Z" level=info msg="API listen on /run/docker.sock" Dec 13 01:47:58.549095 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 01:47:58.549478 systemd[1]: Stopped kubelet.service. Dec 13 01:47:58.565665 kernel: kauditd_printk_skb: 84 callbacks suppressed Dec 13 01:47:58.565804 kernel: audit: type=1130 audit(1734054478.549:264): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.549000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.551694 systemd[1]: Starting kubelet.service... Dec 13 01:47:58.549000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:58.578479 kernel: audit: type=1131 audit(1734054478.549:265): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.147661 systemd[1]: Started kubelet.service. Dec 13 01:47:59.147000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.163475 kernel: audit: type=1130 audit(1734054479.147:266): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:59.198973 kubelet[1966]: E1213 01:47:59.198910 1966 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:47:59.200726 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:47:59.200889 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:47:59.200000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:47:59.214488 kernel: audit: type=1131 audit(1734054479.200:267): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:47:59.973398 env[1410]: time="2024-12-13T01:47:59.973335672Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\"" Dec 13 01:48:00.748068 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1018941561.mount: Deactivated successfully. Dec 13 01:48:02.789107 env[1410]: time="2024-12-13T01:48:02.789044092Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:02.797183 env[1410]: time="2024-12-13T01:48:02.797131772Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:02.804039 env[1410]: time="2024-12-13T01:48:02.803989024Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:02.808552 env[1410]: time="2024-12-13T01:48:02.808506025Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:2804b1e7b9e08f3a3468f8fd2f6487c55968b9293ee51b9efb865b3298acfa26,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:02.809263 env[1410]: time="2024-12-13T01:48:02.809221941Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.29.12\" returns image reference \"sha256:92fbbe8caf9c923e0406b93c082b9e7af30032ace2d836c785633f90514bfefa\"" Dec 13 01:48:02.822584 env[1410]: time="2024-12-13T01:48:02.822543737Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\"" Dec 13 01:48:04.824880 env[1410]: time="2024-12-13T01:48:04.824811527Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:04.840704 env[1410]: time="2024-12-13T01:48:04.840650659Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:04.847198 env[1410]: time="2024-12-13T01:48:04.847143796Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:04.864593 env[1410]: time="2024-12-13T01:48:04.864538661Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:e2f26a3f5ef3fd01f6330cab8b078cf303cfb6d36911a210d0915d535910e412,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:04.865512 env[1410]: time="2024-12-13T01:48:04.865472881Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.29.12\" returns image reference \"sha256:f3b58a53109c96b6bf82adb5973fefa4baec46e2e9ee200be5cc03f3afbf127d\"" Dec 13 01:48:04.877294 env[1410]: time="2024-12-13T01:48:04.877254728Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\"" Dec 13 01:48:06.258757 env[1410]: time="2024-12-13T01:48:06.258699885Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:06.265961 env[1410]: time="2024-12-13T01:48:06.265914929Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:06.275021 env[1410]: time="2024-12-13T01:48:06.274975909Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:06.283527 env[1410]: time="2024-12-13T01:48:06.283491478Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:ed66e2102f4705d45de7513decf3ac61879704984409323779d19e98b970568c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:06.284186 env[1410]: time="2024-12-13T01:48:06.284155591Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.29.12\" returns image reference \"sha256:e6d3373aa79026111619cc6cc1ffff8b27006c56422e7c95724b03a61b530eaf\"" Dec 13 01:48:06.294113 env[1410]: time="2024-12-13T01:48:06.294081589Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\"" Dec 13 01:48:07.593767 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1988670085.mount: Deactivated successfully. Dec 13 01:48:08.161985 env[1410]: time="2024-12-13T01:48:08.161924901Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:08.169509 env[1410]: time="2024-12-13T01:48:08.169438143Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:08.173647 env[1410]: time="2024-12-13T01:48:08.173598621Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.29.12,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:08.178289 env[1410]: time="2024-12-13T01:48:08.178251408Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:bc761494b78fa152a759457f42bc9b86ee9d18f5929bb127bd5f72f8e2112c39,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:08.178646 env[1410]: time="2024-12-13T01:48:08.178611715Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.29.12\" returns image reference \"sha256:d699d5830022f9e67c3271d1c2af58eaede81e3567df82728b7d2a8bf12ed153\"" Dec 13 01:48:08.189526 env[1410]: time="2024-12-13T01:48:08.189479819Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 01:48:08.789959 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3618141156.mount: Deactivated successfully. Dec 13 01:48:09.299007 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Dec 13 01:48:09.299318 systemd[1]: Stopped kubelet.service. Dec 13 01:48:09.315881 kernel: audit: type=1130 audit(1734054489.297:268): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:09.297000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:09.301308 systemd[1]: Starting kubelet.service... Dec 13 01:48:09.297000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:09.332480 kernel: audit: type=1131 audit(1734054489.297:269): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:09.723000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:09.724800 systemd[1]: Started kubelet.service. Dec 13 01:48:09.742487 kernel: audit: type=1130 audit(1734054489.723:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:09.984036 kubelet[1999]: E1213 01:48:09.983870 1999 run.go:74] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:09.986291 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:09.986477 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:09.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:48:10.001476 kernel: audit: type=1131 audit(1734054489.985:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:48:10.858900 env[1410]: time="2024-12-13T01:48:10.858830058Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:10.873545 env[1410]: time="2024-12-13T01:48:10.873488620Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:10.892690 env[1410]: time="2024-12-13T01:48:10.892621860Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:10.904898 env[1410]: time="2024-12-13T01:48:10.904846878Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:10.905764 env[1410]: time="2024-12-13T01:48:10.905726794Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 01:48:10.916008 env[1410]: time="2024-12-13T01:48:10.915939875Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\"" Dec 13 01:48:11.537815 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3111222539.mount: Deactivated successfully. Dec 13 01:48:11.570700 env[1410]: time="2024-12-13T01:48:11.570644762Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:11.578988 env[1410]: time="2024-12-13T01:48:11.578938506Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:11.582985 env[1410]: time="2024-12-13T01:48:11.582943576Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:11.588317 env[1410]: time="2024-12-13T01:48:11.588274668Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:7031c1b283388d2c2e09b57badb803c05ebed362dc88d84b480cc47f72a21097,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:11.588727 env[1410]: time="2024-12-13T01:48:11.588692475Z" level=info msg="PullImage \"registry.k8s.io/pause:3.9\" returns image reference \"sha256:e6f1816883972d4be47bd48879a08919b96afcd344132622e4d444987919323c\"" Dec 13 01:48:11.599173 env[1410]: time="2024-12-13T01:48:11.599126656Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\"" Dec 13 01:48:12.266747 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3279458955.mount: Deactivated successfully. Dec 13 01:48:14.886221 env[1410]: time="2024-12-13T01:48:14.886153264Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:14.896408 env[1410]: time="2024-12-13T01:48:14.896357727Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:14.900401 env[1410]: time="2024-12-13T01:48:14.900358191Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.10-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:14.906411 env[1410]: time="2024-12-13T01:48:14.906372887Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:22f892d7672adc0b9c86df67792afdb8b2dc08880f49f669eaaa59c47d7908c2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:14.907090 env[1410]: time="2024-12-13T01:48:14.907050898Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.10-0\" returns image reference \"sha256:a0eed15eed4498c145ef2f1883fcd300d7adbb759df73c901abd5383dda668e7\"" Dec 13 01:48:18.187799 systemd[1]: Stopped kubelet.service. Dec 13 01:48:18.203583 kernel: audit: type=1130 audit(1734054498.186:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:18.186000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:18.203644 systemd[1]: Starting kubelet.service... Dec 13 01:48:18.189000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:18.221469 kernel: audit: type=1131 audit(1734054498.189:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:18.242104 systemd[1]: Reloading. Dec 13 01:48:18.347481 /usr/lib/systemd/system-generators/torcx-generator[2100]: time="2024-12-13T01:48:18Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:48:18.347518 /usr/lib/systemd/system-generators/torcx-generator[2100]: time="2024-12-13T01:48:18Z" level=info msg="torcx already run" Dec 13 01:48:18.440268 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:48:18.440288 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:48:18.457245 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:48:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.557365 kernel: audit: type=1400 audit(1734054498.525:274): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.557514 kernel: audit: type=1400 audit(1734054498.525:275): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.557544 kernel: audit: type=1400 audit(1734054498.525:276): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.587831 kernel: audit: type=1400 audit(1734054498.525:277): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.624307 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 01:48:18.624474 kernel: audit: type=1400 audit(1734054498.525:278): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.624523 kernel: audit: audit_lost=1 audit_rate_limit=0 audit_backlog_limit=64 Dec 13 01:48:18.624560 kernel: audit: backlog limit exceeded Dec 13 01:48:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.525000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.525000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.556000 audit: BPF prog-id=47 op=LOAD Dec 13 01:48:18.556000 audit: BPF prog-id=30 op=UNLOAD Dec 13 01:48:18.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.556000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.556000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.571000 audit: BPF prog-id=48 op=LOAD Dec 13 01:48:18.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.571000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.571000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.586000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.586000 audit: BPF prog-id=49 op=LOAD Dec 13 01:48:18.586000 audit: BPF prog-id=31 op=UNLOAD Dec 13 01:48:18.586000 audit: BPF prog-id=32 op=UNLOAD Dec 13 01:48:18.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.590000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.590000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit: BPF prog-id=50 op=LOAD Dec 13 01:48:18.591000 audit: BPF prog-id=41 op=UNLOAD Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit: BPF prog-id=51 op=LOAD Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.591000 audit: BPF prog-id=52 op=LOAD Dec 13 01:48:18.591000 audit: BPF prog-id=42 op=UNLOAD Dec 13 01:48:18.591000 audit: BPF prog-id=43 op=UNLOAD Dec 13 01:48:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.592000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.622000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.629000 audit: BPF prog-id=57 op=LOAD Dec 13 01:48:18.629000 audit: BPF prog-id=39 op=UNLOAD Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.632000 audit: BPF prog-id=58 op=LOAD Dec 13 01:48:18.632000 audit: BPF prog-id=44 op=UNLOAD Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit: BPF prog-id=59 op=LOAD Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.633000 audit: BPF prog-id=60 op=LOAD Dec 13 01:48:18.633000 audit: BPF prog-id=36 op=UNLOAD Dec 13 01:48:18.633000 audit: BPF prog-id=37 op=UNLOAD Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:18.635000 audit: BPF prog-id=61 op=LOAD Dec 13 01:48:18.635000 audit: BPF prog-id=46 op=UNLOAD Dec 13 01:48:18.657346 systemd[1]: Started kubelet.service. Dec 13 01:48:18.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:18.660310 systemd[1]: Stopping kubelet.service... Dec 13 01:48:18.660746 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:48:18.659000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:18.660980 systemd[1]: Stopped kubelet.service. Dec 13 01:48:18.662902 systemd[1]: Starting kubelet.service... Dec 13 01:48:19.589000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:19.587592 systemd[1]: Started kubelet.service. Dec 13 01:48:20.248857 kubelet[2170]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:48:20.248857 kubelet[2170]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:48:20.248857 kubelet[2170]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:48:20.249363 kubelet[2170]: I1213 01:48:20.248931 2170 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:48:20.687542 kubelet[2170]: I1213 01:48:20.687506 2170 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 01:48:20.687542 kubelet[2170]: I1213 01:48:20.687534 2170 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:48:20.687857 kubelet[2170]: I1213 01:48:20.687816 2170 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 01:48:20.709629 kubelet[2170]: E1213 01:48:20.709597 2170 certificate_manager.go:562] kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post "https://10.200.8.4:6443/apis/certificates.k8s.io/v1/certificatesigningrequests": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:20.710553 kubelet[2170]: I1213 01:48:20.710519 2170 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:48:20.720015 kubelet[2170]: I1213 01:48:20.719989 2170 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:48:20.721372 kubelet[2170]: I1213 01:48:20.721340 2170 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:48:20.721628 kubelet[2170]: I1213 01:48:20.721585 2170 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 01:48:20.721786 kubelet[2170]: I1213 01:48:20.721641 2170 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:48:20.721786 kubelet[2170]: I1213 01:48:20.721655 2170 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 01:48:20.721786 kubelet[2170]: I1213 01:48:20.721777 2170 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:48:20.721925 kubelet[2170]: I1213 01:48:20.721895 2170 kubelet.go:396] "Attempting to sync node with API server" Dec 13 01:48:20.721925 kubelet[2170]: I1213 01:48:20.721914 2170 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:48:20.721999 kubelet[2170]: I1213 01:48:20.721948 2170 kubelet.go:312] "Adding apiserver pod source" Dec 13 01:48:20.721999 kubelet[2170]: I1213 01:48:20.721969 2170 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:48:20.727065 kubelet[2170]: W1213 01:48:20.727009 2170 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.8.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:20.727177 kubelet[2170]: E1213 01:48:20.727113 2170 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:20.727404 kubelet[2170]: I1213 01:48:20.727383 2170 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:48:20.731365 kubelet[2170]: I1213 01:48:20.731333 2170 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:48:20.731492 kubelet[2170]: W1213 01:48:20.731429 2170 probe.go:268] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 01:48:20.734618 kubelet[2170]: W1213 01:48:20.734567 2170 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.8.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-04a43feb01&limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:20.734777 kubelet[2170]: E1213 01:48:20.734763 2170 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-04a43feb01&limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:20.735708 kubelet[2170]: I1213 01:48:20.735688 2170 server.go:1256] "Started kubelet" Dec 13 01:48:20.737933 kubelet[2170]: I1213 01:48:20.737911 2170 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:48:20.739056 kubelet[2170]: I1213 01:48:20.739036 2170 server.go:461] "Adding debug handlers to kubelet server" Dec 13 01:48:20.740413 kubelet[2170]: I1213 01:48:20.740392 2170 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:48:20.740809 kubelet[2170]: I1213 01:48:20.740792 2170 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:48:20.739000 audit[2170]: AVC avc: denied { mac_admin } for pid=2170 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:20.739000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:20.739000 audit[2170]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0007bdda0 a1=c00007dec0 a2=c0007bdd70 a3=25 items=0 ppid=1 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.739000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:20.739000 audit[2170]: AVC avc: denied { mac_admin } for pid=2170 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:20.739000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:20.739000 audit[2170]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000541fe0 a1=c00007df20 a2=c0007bde60 a3=25 items=0 ppid=1 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.739000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:20.741932 kubelet[2170]: I1213 01:48:20.741317 2170 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:48:20.741932 kubelet[2170]: I1213 01:48:20.741361 2170 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:48:20.741932 kubelet[2170]: I1213 01:48:20.741440 2170 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:48:20.743000 audit[2180]: NETFILTER_CFG table=mangle:32 family=2 entries=2 op=nft_register_chain pid=2180 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:20.743000 audit[2180]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffc16511fe0 a2=0 a3=7ffc16511fcc items=0 ppid=2170 pid=2180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.743000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:48:20.746000 audit[2181]: NETFILTER_CFG table=filter:33 family=2 entries=1 op=nft_register_chain pid=2181 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:20.746000 audit[2181]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd7a9de6d0 a2=0 a3=7ffd7a9de6bc items=0 ppid=2170 pid=2181 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.746000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:48:20.748531 kubelet[2170]: E1213 01:48:20.748507 2170 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.8.4:6443/api/v1/namespaces/default/events\": dial tcp 10.200.8.4:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-04a43feb01.1810996189842d36 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-04a43feb01,UID:ci-3510.3.6-a-04a43feb01,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-04a43feb01,},FirstTimestamp:2024-12-13 01:48:20.735659318 +0000 UTC m=+1.142437546,LastTimestamp:2024-12-13 01:48:20.735659318 +0000 UTC m=+1.142437546,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-04a43feb01,}" Dec 13 01:48:20.751562 kubelet[2170]: I1213 01:48:20.751542 2170 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 01:48:20.753992 kubelet[2170]: I1213 01:48:20.753971 2170 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 01:48:20.754173 kubelet[2170]: I1213 01:48:20.754160 2170 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 01:48:20.752000 audit[2183]: NETFILTER_CFG table=filter:34 family=2 entries=2 op=nft_register_chain pid=2183 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:20.752000 audit[2183]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffec2901c10 a2=0 a3=7ffec2901bfc items=0 ppid=2170 pid=2183 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.752000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:48:20.754956 kubelet[2170]: E1213 01:48:20.754939 2170 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-04a43feb01?timeout=10s\": dial tcp 10.200.8.4:6443: connect: connection refused" interval="200ms" Dec 13 01:48:20.755233 kubelet[2170]: I1213 01:48:20.755217 2170 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:48:20.755434 kubelet[2170]: I1213 01:48:20.755411 2170 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:48:20.755000 audit[2185]: NETFILTER_CFG table=filter:35 family=2 entries=2 op=nft_register_chain pid=2185 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:20.755000 audit[2185]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdd73d1d30 a2=0 a3=7ffdd73d1d1c items=0 ppid=2170 pid=2185 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.755000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:48:20.758237 kubelet[2170]: E1213 01:48:20.758222 2170 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:48:20.758502 kubelet[2170]: I1213 01:48:20.758490 2170 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:48:20.763609 kubelet[2170]: W1213 01:48:20.763568 2170 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:20.763718 kubelet[2170]: E1213 01:48:20.763709 2170 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:20.782000 audit[2192]: NETFILTER_CFG table=filter:36 family=2 entries=1 op=nft_register_rule pid=2192 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:20.782000 audit[2192]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffedbdef5c0 a2=0 a3=7ffedbdef5ac items=0 ppid=2170 pid=2192 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.782000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 01:48:20.784187 kubelet[2170]: I1213 01:48:20.784158 2170 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:48:20.783000 audit[2193]: NETFILTER_CFG table=mangle:37 family=10 entries=2 op=nft_register_chain pid=2193 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:20.783000 audit[2193]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe52767480 a2=0 a3=7ffe5276746c items=0 ppid=2170 pid=2193 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.783000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:48:20.785613 kubelet[2170]: I1213 01:48:20.785506 2170 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:48:20.785613 kubelet[2170]: I1213 01:48:20.785536 2170 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:48:20.785613 kubelet[2170]: I1213 01:48:20.785558 2170 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 01:48:20.785744 kubelet[2170]: E1213 01:48:20.785619 2170 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:48:20.785000 audit[2195]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2195 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:20.785000 audit[2194]: NETFILTER_CFG table=mangle:39 family=2 entries=1 op=nft_register_chain pid=2194 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:20.785000 audit[2194]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb261dde0 a2=0 a3=10e3 items=0 ppid=2170 pid=2194 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.785000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:48:20.785000 audit[2195]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdd188fa00 a2=0 a3=7ffdd188f9ec items=0 ppid=2170 pid=2195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.785000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:48:20.788614 kubelet[2170]: W1213 01:48:20.788411 2170 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.8.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:20.788614 kubelet[2170]: E1213 01:48:20.788531 2170 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:20.788000 audit[2198]: NETFILTER_CFG table=nat:40 family=2 entries=1 op=nft_register_chain pid=2198 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:20.788000 audit[2198]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff19b35b00 a2=0 a3=7fff19b35aec items=0 ppid=2170 pid=2198 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.788000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:48:20.788000 audit[2199]: NETFILTER_CFG table=nat:41 family=10 entries=2 op=nft_register_chain pid=2199 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:20.788000 audit[2199]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7fffee86b4b0 a2=0 a3=10e3 items=0 ppid=2170 pid=2199 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.788000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:48:20.789000 audit[2200]: NETFILTER_CFG table=filter:42 family=10 entries=2 op=nft_register_chain pid=2200 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:20.789000 audit[2200]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe1f3121d0 a2=0 a3=7ffe1f3121bc items=0 ppid=2170 pid=2200 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.789000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:48:20.790000 audit[2201]: NETFILTER_CFG table=filter:43 family=2 entries=1 op=nft_register_chain pid=2201 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:20.790000 audit[2201]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffeb977ac60 a2=0 a3=7ffeb977ac4c items=0 ppid=2170 pid=2201 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.790000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:48:20.806477 kubelet[2170]: I1213 01:48:20.806439 2170 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:48:20.806644 kubelet[2170]: I1213 01:48:20.806631 2170 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:48:20.806720 kubelet[2170]: I1213 01:48:20.806712 2170 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:48:20.811925 kubelet[2170]: I1213 01:48:20.811902 2170 policy_none.go:49] "None policy: Start" Dec 13 01:48:20.812792 kubelet[2170]: I1213 01:48:20.812768 2170 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:48:20.812880 kubelet[2170]: I1213 01:48:20.812811 2170 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:48:20.822231 systemd[1]: Created slice kubepods.slice. Dec 13 01:48:20.827040 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 01:48:20.829809 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 01:48:20.836163 kubelet[2170]: I1213 01:48:20.836138 2170 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:48:20.834000 audit[2170]: AVC avc: denied { mac_admin } for pid=2170 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:20.834000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:20.834000 audit[2170]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000e5d200 a1=c000e70ae0 a2=c000e5d1d0 a3=25 items=0 ppid=1 pid=2170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:20.834000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:20.836596 kubelet[2170]: I1213 01:48:20.836217 2170 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:48:20.836596 kubelet[2170]: I1213 01:48:20.836428 2170 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:48:20.839761 kubelet[2170]: E1213 01:48:20.839741 2170 eviction_manager.go:282] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-04a43feb01\" not found" Dec 13 01:48:20.853967 kubelet[2170]: I1213 01:48:20.853940 2170 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.854363 kubelet[2170]: E1213 01:48:20.854335 2170 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.4:6443/api/v1/nodes\": dial tcp 10.200.8.4:6443: connect: connection refused" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.886866 kubelet[2170]: I1213 01:48:20.886629 2170 topology_manager.go:215] "Topology Admit Handler" podUID="7e7c720c5c5181dad1f9979ba158e425" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.888608 kubelet[2170]: I1213 01:48:20.888581 2170 topology_manager.go:215] "Topology Admit Handler" podUID="55edd08a97a3e0c900376f52548df39f" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.890310 kubelet[2170]: I1213 01:48:20.890290 2170 topology_manager.go:215] "Topology Admit Handler" podUID="2487bbfb520d85217088d413b8783b55" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.896723 systemd[1]: Created slice kubepods-burstable-pod7e7c720c5c5181dad1f9979ba158e425.slice. Dec 13 01:48:20.906355 systemd[1]: Created slice kubepods-burstable-pod55edd08a97a3e0c900376f52548df39f.slice. Dec 13 01:48:20.915788 systemd[1]: Created slice kubepods-burstable-pod2487bbfb520d85217088d413b8783b55.slice. Dec 13 01:48:20.956425 kubelet[2170]: I1213 01:48:20.955830 2170 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.956724 kubelet[2170]: I1213 01:48:20.956689 2170 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.956871 kubelet[2170]: I1213 01:48:20.956857 2170 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7e7c720c5c5181dad1f9979ba158e425-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-04a43feb01\" (UID: \"7e7c720c5c5181dad1f9979ba158e425\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.957010 kubelet[2170]: I1213 01:48:20.956998 2170 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.957137 kubelet[2170]: I1213 01:48:20.957126 2170 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.957280 kubelet[2170]: I1213 01:48:20.957269 2170 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.957409 kubelet[2170]: I1213 01:48:20.957398 2170 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2487bbfb520d85217088d413b8783b55-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-04a43feb01\" (UID: \"2487bbfb520d85217088d413b8783b55\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.957571 kubelet[2170]: I1213 01:48:20.957558 2170 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7e7c720c5c5181dad1f9979ba158e425-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-04a43feb01\" (UID: \"7e7c720c5c5181dad1f9979ba158e425\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.957706 kubelet[2170]: I1213 01:48:20.957695 2170 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7e7c720c5c5181dad1f9979ba158e425-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-04a43feb01\" (UID: \"7e7c720c5c5181dad1f9979ba158e425\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:20.957846 kubelet[2170]: E1213 01:48:20.956351 2170 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-04a43feb01?timeout=10s\": dial tcp 10.200.8.4:6443: connect: connection refused" interval="400ms" Dec 13 01:48:21.056857 kubelet[2170]: I1213 01:48:21.056814 2170 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:21.057314 kubelet[2170]: E1213 01:48:21.057283 2170 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.4:6443/api/v1/nodes\": dial tcp 10.200.8.4:6443: connect: connection refused" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:21.057944 kubelet[2170]: E1213 01:48:21.057910 2170 event.go:355] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.8.4:6443/api/v1/namespaces/default/events\": dial tcp 10.200.8.4:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-04a43feb01.1810996189842d36 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-04a43feb01,UID:ci-3510.3.6-a-04a43feb01,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-04a43feb01,},FirstTimestamp:2024-12-13 01:48:20.735659318 +0000 UTC m=+1.142437546,LastTimestamp:2024-12-13 01:48:20.735659318 +0000 UTC m=+1.142437546,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-04a43feb01,}" Dec 13 01:48:21.204848 env[1410]: time="2024-12-13T01:48:21.204786658Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-04a43feb01,Uid:7e7c720c5c5181dad1f9979ba158e425,Namespace:kube-system,Attempt:0,}" Dec 13 01:48:21.215102 env[1410]: time="2024-12-13T01:48:21.214715990Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-04a43feb01,Uid:55edd08a97a3e0c900376f52548df39f,Namespace:kube-system,Attempt:0,}" Dec 13 01:48:21.218325 env[1410]: time="2024-12-13T01:48:21.218289437Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-04a43feb01,Uid:2487bbfb520d85217088d413b8783b55,Namespace:kube-system,Attempt:0,}" Dec 13 01:48:21.358918 kubelet[2170]: E1213 01:48:21.358876 2170 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-04a43feb01?timeout=10s\": dial tcp 10.200.8.4:6443: connect: connection refused" interval="800ms" Dec 13 01:48:21.459288 kubelet[2170]: I1213 01:48:21.459001 2170 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:21.460655 kubelet[2170]: E1213 01:48:21.459369 2170 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.4:6443/api/v1/nodes\": dial tcp 10.200.8.4:6443: connect: connection refused" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:21.812701 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2075190607.mount: Deactivated successfully. Dec 13 01:48:21.830964 kubelet[2170]: W1213 01:48:21.830906 2170 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Service: Get "https://10.200.8.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:21.830964 kubelet[2170]: E1213 01:48:21.830966 2170 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Service: failed to list *v1.Service: Get "https://10.200.8.4:6443/api/v1/services?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:21.858594 env[1410]: time="2024-12-13T01:48:21.858533657Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.865024 env[1410]: time="2024-12-13T01:48:21.864966143Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.883206 env[1410]: time="2024-12-13T01:48:21.883146185Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.887957 env[1410]: time="2024-12-13T01:48:21.887911748Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.892977 env[1410]: time="2024-12-13T01:48:21.892933015Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.899633 env[1410]: time="2024-12-13T01:48:21.899591603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.904218 env[1410]: time="2024-12-13T01:48:21.904178664Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.909425 env[1410]: time="2024-12-13T01:48:21.909385934Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.917916 env[1410]: time="2024-12-13T01:48:21.917865347Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.924234 env[1410]: time="2024-12-13T01:48:21.924187231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.938185 env[1410]: time="2024-12-13T01:48:21.938135316Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:21.961234 env[1410]: time="2024-12-13T01:48:21.961188223Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:22.050429 env[1410]: time="2024-12-13T01:48:22.050354594Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:22.050429 env[1410]: time="2024-12-13T01:48:22.050391695Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:22.050429 env[1410]: time="2024-12-13T01:48:22.050407195Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:22.050857 env[1410]: time="2024-12-13T01:48:22.050800300Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/58229ccc16282baf650f07c05669fedbaf38ff8765dd97567d5e5242b27b82ad pid=2217 runtime=io.containerd.runc.v2 Dec 13 01:48:22.053668 env[1410]: time="2024-12-13T01:48:22.053596636Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:22.053825 env[1410]: time="2024-12-13T01:48:22.053800639Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:22.053917 env[1410]: time="2024-12-13T01:48:22.053897640Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:22.054221 env[1410]: time="2024-12-13T01:48:22.054190944Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/abfd9da51ec1efabf9c9924f78dddd57bde09cefcf4de63dbf2bf6432568a174 pid=2216 runtime=io.containerd.runc.v2 Dec 13 01:48:22.075028 systemd[1]: Started cri-containerd-abfd9da51ec1efabf9c9924f78dddd57bde09cefcf4de63dbf2bf6432568a174.scope. Dec 13 01:48:22.093606 systemd[1]: Started cri-containerd-58229ccc16282baf650f07c05669fedbaf38ff8765dd97567d5e5242b27b82ad.scope. Dec 13 01:48:22.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.096000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.096000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit: BPF prog-id=62 op=LOAD Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2216 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666439646135316563316566616266396339393234663738646464 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2216 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666439646135316563316566616266396339393234663738646464 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.097000 audit: BPF prog-id=63 op=LOAD Dec 13 01:48:22.097000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000201170 items=0 ppid=2216 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.097000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666439646135316563316566616266396339393234663738646464 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit: BPF prog-id=64 op=LOAD Dec 13 01:48:22.098000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0002011b8 items=0 ppid=2216 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666439646135316563316566616266396339393234663738646464 Dec 13 01:48:22.098000 audit: BPF prog-id=64 op=UNLOAD Dec 13 01:48:22.098000 audit: BPF prog-id=63 op=UNLOAD Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { perfmon } for pid=2236 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit[2236]: AVC avc: denied { bpf } for pid=2236 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.098000 audit: BPF prog-id=65 op=LOAD Dec 13 01:48:22.098000 audit[2236]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0002015c8 items=0 ppid=2216 pid=2236 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.098000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6162666439646135316563316566616266396339393234663738646464 Dec 13 01:48:22.102315 kubelet[2170]: W1213 01:48:22.099780 2170 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.Node: Get "https://10.200.8.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-04a43feb01&limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:22.102315 kubelet[2170]: E1213 01:48:22.099892 2170 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.Node: failed to list *v1.Node: Get "https://10.200.8.4:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-04a43feb01&limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:22.107710 env[1410]: time="2024-12-13T01:48:22.107621237Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:22.107918 env[1410]: time="2024-12-13T01:48:22.107888241Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:22.108060 env[1410]: time="2024-12-13T01:48:22.108027442Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:22.108323 env[1410]: time="2024-12-13T01:48:22.108283346Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/f603ad470e6ed34a0b6415fb39d844e98f5b788e127f7a9dab2adf8368c813bf pid=2270 runtime=io.containerd.runc.v2 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.125000 audit: BPF prog-id=66 op=LOAD Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2217 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323239636363313632383262616636353066303763303536363966 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2217 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323239636363313632383262616636353066303763303536363966 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit: BPF prog-id=67 op=LOAD Dec 13 01:48:22.126000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003ee7e0 items=0 ppid=2217 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323239636363313632383262616636353066303763303536363966 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit: BPF prog-id=68 op=LOAD Dec 13 01:48:22.126000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c0003ee828 items=0 ppid=2217 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323239636363313632383262616636353066303763303536363966 Dec 13 01:48:22.126000 audit: BPF prog-id=68 op=UNLOAD Dec 13 01:48:22.126000 audit: BPF prog-id=67 op=UNLOAD Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { perfmon } for pid=2237 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit[2237]: AVC avc: denied { bpf } for pid=2237 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.126000 audit: BPF prog-id=69 op=LOAD Dec 13 01:48:22.126000 audit[2237]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0003eec38 items=0 ppid=2217 pid=2237 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.126000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3538323239636363313632383262616636353066303763303536363966 Dec 13 01:48:22.136008 systemd[1]: Started cri-containerd-f603ad470e6ed34a0b6415fb39d844e98f5b788e127f7a9dab2adf8368c813bf.scope. Dec 13 01:48:22.162018 kubelet[2170]: E1213 01:48:22.161973 2170 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.4:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-04a43feb01?timeout=10s\": dial tcp 10.200.8.4:6443: connect: connection refused" interval="1.6s" Dec 13 01:48:22.170063 kubelet[2170]: W1213 01:48:22.169919 2170 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:22.170063 kubelet[2170]: E1213 01:48:22.170012 2170 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get "https://10.200.8.4:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:22.172316 env[1410]: time="2024-12-13T01:48:22.172270476Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-04a43feb01,Uid:7e7c720c5c5181dad1f9979ba158e425,Namespace:kube-system,Attempt:0,} returns sandbox id \"abfd9da51ec1efabf9c9924f78dddd57bde09cefcf4de63dbf2bf6432568a174\"" Dec 13 01:48:22.181500 env[1410]: time="2024-12-13T01:48:22.180366981Z" level=info msg="CreateContainer within sandbox \"abfd9da51ec1efabf9c9924f78dddd57bde09cefcf4de63dbf2bf6432568a174\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 01:48:22.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.182000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit: BPF prog-id=70 op=LOAD Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00019fc48 a2=10 a3=1c items=0 ppid=2270 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636303361643437306536656433346130623634313566623339643834 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00019f6b0 a2=3c a3=c items=0 ppid=2270 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636303361643437306536656433346130623634313566623339643834 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.183000 audit: BPF prog-id=71 op=LOAD Dec 13 01:48:22.183000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019f9d8 a2=78 a3=c0003226e0 items=0 ppid=2270 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.183000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636303361643437306536656433346130623634313566623339643834 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit: BPF prog-id=72 op=LOAD Dec 13 01:48:22.184000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00019f770 a2=78 a3=c000322728 items=0 ppid=2270 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636303361643437306536656433346130623634313566623339643834 Dec 13 01:48:22.184000 audit: BPF prog-id=72 op=UNLOAD Dec 13 01:48:22.184000 audit: BPF prog-id=71 op=UNLOAD Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { perfmon } for pid=2279 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit[2279]: AVC avc: denied { bpf } for pid=2279 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.184000 audit: BPF prog-id=73 op=LOAD Dec 13 01:48:22.184000 audit[2279]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00019fc30 a2=78 a3=c000322b38 items=0 ppid=2270 pid=2279 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.184000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6636303361643437306536656433346130623634313566623339643834 Dec 13 01:48:22.197474 env[1410]: time="2024-12-13T01:48:22.197368701Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-04a43feb01,Uid:2487bbfb520d85217088d413b8783b55,Namespace:kube-system,Attempt:0,} returns sandbox id \"58229ccc16282baf650f07c05669fedbaf38ff8765dd97567d5e5242b27b82ad\"" Dec 13 01:48:22.200789 env[1410]: time="2024-12-13T01:48:22.200722745Z" level=info msg="CreateContainer within sandbox \"58229ccc16282baf650f07c05669fedbaf38ff8765dd97567d5e5242b27b82ad\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 01:48:22.221079 env[1410]: time="2024-12-13T01:48:22.221027908Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-04a43feb01,Uid:55edd08a97a3e0c900376f52548df39f,Namespace:kube-system,Attempt:0,} returns sandbox id \"f603ad470e6ed34a0b6415fb39d844e98f5b788e127f7a9dab2adf8368c813bf\"" Dec 13 01:48:22.224974 env[1410]: time="2024-12-13T01:48:22.224920859Z" level=info msg="CreateContainer within sandbox \"f603ad470e6ed34a0b6415fb39d844e98f5b788e127f7a9dab2adf8368c813bf\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 01:48:22.262472 kubelet[2170]: I1213 01:48:22.262357 2170 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:22.262882 kubelet[2170]: E1213 01:48:22.262855 2170 kubelet_node_status.go:96] "Unable to register node with API server" err="Post \"https://10.200.8.4:6443/api/v1/nodes\": dial tcp 10.200.8.4:6443: connect: connection refused" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:22.271133 env[1410]: time="2024-12-13T01:48:22.271094357Z" level=info msg="CreateContainer within sandbox \"abfd9da51ec1efabf9c9924f78dddd57bde09cefcf4de63dbf2bf6432568a174\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"c72c4b8fd1b42d58096fdd8e8eb4c5c087a2ae9011771baadec316188b05749d\"" Dec 13 01:48:22.271834 env[1410]: time="2024-12-13T01:48:22.271809867Z" level=info msg="StartContainer for \"c72c4b8fd1b42d58096fdd8e8eb4c5c087a2ae9011771baadec316188b05749d\"" Dec 13 01:48:22.291233 systemd[1]: Started cri-containerd-c72c4b8fd1b42d58096fdd8e8eb4c5c087a2ae9011771baadec316188b05749d.scope. Dec 13 01:48:22.301070 env[1410]: time="2024-12-13T01:48:22.301004845Z" level=info msg="CreateContainer within sandbox \"58229ccc16282baf650f07c05669fedbaf38ff8765dd97567d5e5242b27b82ad\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"e18eec260ad33855f78b535d756ed3bfb2d20580540652aa361ecc95f17bd8e1\"" Dec 13 01:48:22.302021 env[1410]: time="2024-12-13T01:48:22.301988058Z" level=info msg="StartContainer for \"e18eec260ad33855f78b535d756ed3bfb2d20580540652aa361ecc95f17bd8e1\"" Dec 13 01:48:22.305776 env[1410]: time="2024-12-13T01:48:22.305736007Z" level=info msg="CreateContainer within sandbox \"f603ad470e6ed34a0b6415fb39d844e98f5b788e127f7a9dab2adf8368c813bf\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"6c9b3188df3d5983bc787670df9600dafa88e4d94ff3d5c66e1db32debbdfa89\"" Dec 13 01:48:22.306640 env[1410]: time="2024-12-13T01:48:22.306611818Z" level=info msg="StartContainer for \"6c9b3188df3d5983bc787670df9600dafa88e4d94ff3d5c66e1db32debbdfa89\"" Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.307000 audit: BPF prog-id=74 op=LOAD Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337326334623866643162343264353830393666646438653865623463 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337326334623866643162343264353830393666646438653865623463 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.308000 audit: BPF prog-id=75 op=LOAD Dec 13 01:48:22.308000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c0003883e0 items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.308000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337326334623866643162343264353830393666646438653865623463 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit: BPF prog-id=76 op=LOAD Dec 13 01:48:22.309000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000388428 items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337326334623866643162343264353830393666646438653865623463 Dec 13 01:48:22.309000 audit: BPF prog-id=76 op=UNLOAD Dec 13 01:48:22.309000 audit: BPF prog-id=75 op=UNLOAD Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { perfmon } for pid=2343 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit[2343]: AVC avc: denied { bpf } for pid=2343 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.309000 audit: BPF prog-id=77 op=LOAD Dec 13 01:48:22.309000 audit[2343]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000388838 items=0 ppid=2216 pid=2343 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.309000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6337326334623866643162343264353830393666646438653865623463 Dec 13 01:48:22.339226 systemd[1]: Started cri-containerd-6c9b3188df3d5983bc787670df9600dafa88e4d94ff3d5c66e1db32debbdfa89.scope. Dec 13 01:48:22.356843 kubelet[2170]: W1213 01:48:22.356672 2170 reflector.go:539] vendor/k8s.io/client-go/informers/factory.go:159: failed to list *v1.RuntimeClass: Get "https://10.200.8.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:22.356843 kubelet[2170]: E1213 01:48:22.356811 2170 reflector.go:147] vendor/k8s.io/client-go/informers/factory.go:159: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get "https://10.200.8.4:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.4:6443: connect: connection refused Dec 13 01:48:22.358469 systemd[1]: Started cri-containerd-e18eec260ad33855f78b535d756ed3bfb2d20580540652aa361ecc95f17bd8e1.scope. Dec 13 01:48:22.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.373000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.373000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.374000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.374000 audit: BPF prog-id=78 op=LOAD Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2270 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396233313838646633643539383362633738373637306466393630 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2270 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396233313838646633643539383362633738373637306466393630 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.375000 audit: BPF prog-id=79 op=LOAD Dec 13 01:48:22.375000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c0003be800 items=0 ppid=2270 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.375000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396233313838646633643539383362633738373637306466393630 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit: BPF prog-id=80 op=LOAD Dec 13 01:48:22.376000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c0003be848 items=0 ppid=2270 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396233313838646633643539383362633738373637306466393630 Dec 13 01:48:22.376000 audit: BPF prog-id=80 op=UNLOAD Dec 13 01:48:22.376000 audit: BPF prog-id=79 op=UNLOAD Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { perfmon } for pid=2377 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit[2377]: AVC avc: denied { bpf } for pid=2377 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.376000 audit: BPF prog-id=81 op=LOAD Dec 13 01:48:22.376000 audit[2377]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c0003bec58 items=0 ppid=2270 pid=2377 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.376000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3663396233313838646633643539383362633738373637306466393630 Dec 13 01:48:22.392683 env[1410]: time="2024-12-13T01:48:22.392627834Z" level=info msg="StartContainer for \"c72c4b8fd1b42d58096fdd8e8eb4c5c087a2ae9011771baadec316188b05749d\" returns successfully" Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.415000 audit: BPF prog-id=82 op=LOAD Dec 13 01:48:22.416000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.416000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=2217 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.416000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531386565633236306164333338353566373862353335643735366564 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=2217 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531386565633236306164333338353566373862353335643735366564 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.417000 audit: BPF prog-id=83 op=LOAD Dec 13 01:48:22.417000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c00028f2f0 items=0 ppid=2217 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.417000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531386565633236306164333338353566373862353335643735366564 Dec 13 01:48:22.418000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.418000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.418000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.418000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.418000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.418000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.418000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.418000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.418000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.418000 audit: BPF prog-id=84 op=LOAD Dec 13 01:48:22.418000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c00028f338 items=0 ppid=2217 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.418000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531386565633236306164333338353566373862353335643735366564 Dec 13 01:48:22.419000 audit: BPF prog-id=84 op=UNLOAD Dec 13 01:48:22.419000 audit: BPF prog-id=83 op=UNLOAD Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { perfmon } for pid=2378 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit[2378]: AVC avc: denied { bpf } for pid=2378 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:22.419000 audit: BPF prog-id=85 op=LOAD Dec 13 01:48:22.419000 audit[2378]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00028f748 items=0 ppid=2217 pid=2378 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:22.419000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6531386565633236306164333338353566373862353335643735366564 Dec 13 01:48:22.434280 env[1410]: time="2024-12-13T01:48:22.434220773Z" level=info msg="StartContainer for \"6c9b3188df3d5983bc787670df9600dafa88e4d94ff3d5c66e1db32debbdfa89\" returns successfully" Dec 13 01:48:22.540163 env[1410]: time="2024-12-13T01:48:22.540091846Z" level=info msg="StartContainer for \"e18eec260ad33855f78b535d756ed3bfb2d20580540652aa361ecc95f17bd8e1\" returns successfully" Dec 13 01:48:23.658990 kernel: kauditd_printk_skb: 643 callbacks suppressed Dec 13 01:48:23.659183 kernel: audit: type=1400 audit(1734054503.632:529): avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:23.632000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:23.634000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:23.688486 kernel: audit: type=1400 audit(1734054503.634:530): avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:23.634000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ba2ca0 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:23.724479 kernel: audit: type=1300 audit(1734054503.634:530): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ba2ca0 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:23.634000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:23.745478 kernel: audit: type=1327 audit(1734054503.634:530): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:23.632000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0008ec060 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:23.772482 kernel: audit: type=1300 audit(1734054503.632:529): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0008ec060 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:23.632000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:23.793581 kernel: audit: type=1327 audit(1734054503.632:529): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:23.864992 kubelet[2170]: I1213 01:48:23.864950 2170 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:24.392000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:24.415471 kernel: audit: type=1400 audit(1734054504.392:531): avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:24.402000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:24.442476 kernel: audit: type=1400 audit(1734054504.402:532): avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:24.402000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0071ddf80 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:48:24.471496 kernel: audit: type=1300 audit(1734054504.402:532): arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0071ddf80 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:48:24.402000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:48:24.498482 kernel: audit: type=1327 audit(1734054504.402:532): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:48:24.392000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c007346000 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:48:24.392000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:48:24.413000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:24.413000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=40 a1=c006584060 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:48:24.413000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:48:24.414000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:24.414000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=4a a1=c007786600 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:48:24.414000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:48:24.457000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:24.457000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0042aed40 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:48:24.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:48:24.457000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:24.457000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=41 a1=c0076b6180 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:48:24.457000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:48:24.510970 kubelet[2170]: E1213 01:48:24.510942 2170 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-a-04a43feb01\" not found" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:24.573976 kubelet[2170]: I1213 01:48:24.573932 2170 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:24.600254 kubelet[2170]: E1213 01:48:24.600218 2170 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-04a43feb01\" not found" Dec 13 01:48:24.700763 kubelet[2170]: E1213 01:48:24.700647 2170 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-04a43feb01\" not found" Dec 13 01:48:24.801795 kubelet[2170]: E1213 01:48:24.801740 2170 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-04a43feb01\" not found" Dec 13 01:48:24.902801 kubelet[2170]: E1213 01:48:24.902749 2170 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-04a43feb01\" not found" Dec 13 01:48:25.003395 kubelet[2170]: E1213 01:48:25.003259 2170 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-04a43feb01\" not found" Dec 13 01:48:25.103842 kubelet[2170]: E1213 01:48:25.103783 2170 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-04a43feb01\" not found" Dec 13 01:48:25.204340 kubelet[2170]: E1213 01:48:25.204282 2170 kubelet_node_status.go:462] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-04a43feb01\" not found" Dec 13 01:48:25.729020 kubelet[2170]: I1213 01:48:25.728979 2170 apiserver.go:52] "Watching apiserver" Dec 13 01:48:25.754319 kubelet[2170]: I1213 01:48:25.754270 2170 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 01:48:27.366778 systemd[1]: Reloading. Dec 13 01:48:27.482483 /usr/lib/systemd/system-generators/torcx-generator[2468]: time="2024-12-13T01:48:27Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:48:27.482951 /usr/lib/systemd/system-generators/torcx-generator[2468]: time="2024-12-13T01:48:27Z" level=info msg="torcx already run" Dec 13 01:48:27.561762 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:48:27.561783 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:48:27.581848 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:48:27.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.665000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.666000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.666000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit: BPF prog-id=86 op=LOAD Dec 13 01:48:27.667000 audit: BPF prog-id=47 op=UNLOAD Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.667000 audit: BPF prog-id=87 op=LOAD Dec 13 01:48:27.667000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.668000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.668000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.668000 audit: BPF prog-id=88 op=LOAD Dec 13 01:48:27.668000 audit: BPF prog-id=48 op=UNLOAD Dec 13 01:48:27.668000 audit: BPF prog-id=49 op=UNLOAD Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.669000 audit: BPF prog-id=89 op=LOAD Dec 13 01:48:27.669000 audit: BPF prog-id=82 op=UNLOAD Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.670000 audit: BPF prog-id=90 op=LOAD Dec 13 01:48:27.670000 audit: BPF prog-id=78 op=UNLOAD Dec 13 01:48:27.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.673000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.673000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit: BPF prog-id=91 op=LOAD Dec 13 01:48:27.674000 audit: BPF prog-id=50 op=UNLOAD Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit: BPF prog-id=92 op=LOAD Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.674000 audit: BPF prog-id=93 op=LOAD Dec 13 01:48:27.674000 audit: BPF prog-id=51 op=UNLOAD Dec 13 01:48:27.674000 audit: BPF prog-id=52 op=UNLOAD Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.675000 audit: BPF prog-id=94 op=LOAD Dec 13 01:48:27.675000 audit: BPF prog-id=70 op=UNLOAD Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.676000 audit: BPF prog-id=95 op=LOAD Dec 13 01:48:27.676000 audit: BPF prog-id=53 op=UNLOAD Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit: BPF prog-id=96 op=LOAD Dec 13 01:48:27.677000 audit: BPF prog-id=54 op=UNLOAD Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit: BPF prog-id=97 op=LOAD Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.677000 audit: BPF prog-id=98 op=LOAD Dec 13 01:48:27.677000 audit: BPF prog-id=55 op=UNLOAD Dec 13 01:48:27.677000 audit: BPF prog-id=56 op=UNLOAD Dec 13 01:48:27.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.678000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.678000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.679000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.679000 audit: BPF prog-id=99 op=LOAD Dec 13 01:48:27.679000 audit: BPF prog-id=57 op=UNLOAD Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.680000 audit: BPF prog-id=100 op=LOAD Dec 13 01:48:27.680000 audit: BPF prog-id=66 op=UNLOAD Dec 13 01:48:27.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.681000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit: BPF prog-id=101 op=LOAD Dec 13 01:48:27.682000 audit: BPF prog-id=62 op=UNLOAD Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.682000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.683000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.683000 audit: BPF prog-id=102 op=LOAD Dec 13 01:48:27.683000 audit: BPF prog-id=58 op=UNLOAD Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit: BPF prog-id=103 op=LOAD Dec 13 01:48:27.684000 audit: BPF prog-id=74 op=UNLOAD Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit: BPF prog-id=104 op=LOAD Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.684000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.685000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.685000 audit: BPF prog-id=105 op=LOAD Dec 13 01:48:27.685000 audit: BPF prog-id=59 op=UNLOAD Dec 13 01:48:27.685000 audit: BPF prog-id=60 op=UNLOAD Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.686000 audit: BPF prog-id=106 op=LOAD Dec 13 01:48:27.686000 audit: BPF prog-id=61 op=UNLOAD Dec 13 01:48:27.704659 systemd[1]: Stopping kubelet.service... Dec 13 01:48:27.705418 kubelet[2170]: I1213 01:48:27.705250 2170 dynamic_cafile_content.go:171] "Shutting down controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:48:27.717000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:27.719071 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:48:27.719241 systemd[1]: Stopped kubelet.service. Dec 13 01:48:27.721941 systemd[1]: Starting kubelet.service... Dec 13 01:48:27.770000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:27.770000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ba2ac0 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:27.770000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:27.771000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:27.771000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000ba2c80 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:27.771000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:27.772000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:27.772000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:48:27.772000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000ba2ea0 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:27.772000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:27.772000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000c4f540 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:27.772000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:27.884440 systemd[1]: Started kubelet.service. Dec 13 01:48:27.883000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:27.966046 kubelet[2533]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:48:27.966435 kubelet[2533]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:48:27.966533 kubelet[2533]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:48:27.966732 kubelet[2533]: I1213 01:48:27.966687 2533 server.go:204] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:48:27.973700 kubelet[2533]: I1213 01:48:27.973671 2533 server.go:487] "Kubelet version" kubeletVersion="v1.29.2" Dec 13 01:48:27.973886 kubelet[2533]: I1213 01:48:27.973869 2533 server.go:489] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:48:27.974203 kubelet[2533]: I1213 01:48:27.974182 2533 server.go:919] "Client rotation is on, will bootstrap in background" Dec 13 01:48:27.976498 kubelet[2533]: I1213 01:48:27.976477 2533 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 01:48:27.980026 kubelet[2533]: I1213 01:48:27.979999 2533 dynamic_cafile_content.go:157] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:48:27.992228 kubelet[2533]: I1213 01:48:27.992204 2533 server.go:745] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:48:27.992501 kubelet[2533]: I1213 01:48:27.992481 2533 container_manager_linux.go:265] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:48:27.992718 kubelet[2533]: I1213 01:48:27.992696 2533 container_manager_linux.go:270] "Creating Container Manager object based on Node Config" nodeConfig={"RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null} Dec 13 01:48:27.992877 kubelet[2533]: I1213 01:48:27.992727 2533 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:48:27.992877 kubelet[2533]: I1213 01:48:27.992740 2533 container_manager_linux.go:301] "Creating device plugin manager" Dec 13 01:48:27.992877 kubelet[2533]: I1213 01:48:27.992795 2533 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:48:27.993004 kubelet[2533]: I1213 01:48:27.992918 2533 kubelet.go:396] "Attempting to sync node with API server" Dec 13 01:48:27.993004 kubelet[2533]: I1213 01:48:27.992937 2533 kubelet.go:301] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:48:27.993004 kubelet[2533]: I1213 01:48:27.992968 2533 kubelet.go:312] "Adding apiserver pod source" Dec 13 01:48:27.993004 kubelet[2533]: I1213 01:48:27.992991 2533 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:48:27.997341 kubelet[2533]: I1213 01:48:27.994427 2533 kuberuntime_manager.go:258] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:48:27.997341 kubelet[2533]: I1213 01:48:27.994674 2533 kubelet.go:809] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:48:27.997341 kubelet[2533]: I1213 01:48:27.995131 2533 server.go:1256] "Started kubelet" Dec 13 01:48:27.998000 audit[2533]: AVC avc: denied { mac_admin } for pid=2533 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.998000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:27.998000 audit[2533]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0005838f0 a1=c000a036b0 a2=c0005838c0 a3=25 items=0 ppid=1 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:27.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:27.998000 audit[2533]: AVC avc: denied { mac_admin } for pid=2533 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:27.998000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:27.998000 audit[2533]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0003630c0 a1=c000a036c8 a2=c0006fa030 a3=25 items=0 ppid=1 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:27.998000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:28.000682 kubelet[2533]: I1213 01:48:28.000239 2533 kubelet.go:1417] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:48:28.000682 kubelet[2533]: I1213 01:48:28.000303 2533 kubelet.go:1421] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:48:28.000682 kubelet[2533]: I1213 01:48:28.000342 2533 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:48:28.008503 kubelet[2533]: I1213 01:48:28.006758 2533 server.go:162] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:48:28.008503 kubelet[2533]: I1213 01:48:28.007744 2533 server.go:461] "Adding debug handlers to kubelet server" Dec 13 01:48:28.013216 kubelet[2533]: I1213 01:48:28.012084 2533 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:48:28.013216 kubelet[2533]: I1213 01:48:28.012326 2533 server.go:233] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:48:28.014868 kubelet[2533]: I1213 01:48:28.014844 2533 volume_manager.go:291] "Starting Kubelet Volume Manager" Dec 13 01:48:28.017177 kubelet[2533]: I1213 01:48:28.017116 2533 desired_state_of_world_populator.go:151] "Desired state populator starts to run" Dec 13 01:48:28.017320 kubelet[2533]: I1213 01:48:28.017305 2533 reconciler_new.go:29] "Reconciler: start to sync state" Dec 13 01:48:28.021179 kubelet[2533]: I1213 01:48:28.020391 2533 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:48:28.021670 kubelet[2533]: I1213 01:48:28.021650 2533 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:48:28.021750 kubelet[2533]: I1213 01:48:28.021688 2533 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:48:28.021750 kubelet[2533]: I1213 01:48:28.021707 2533 kubelet.go:2329] "Starting kubelet main sync loop" Dec 13 01:48:28.021840 kubelet[2533]: E1213 01:48:28.021763 2533 kubelet.go:2353] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:48:28.032113 kubelet[2533]: I1213 01:48:28.032050 2533 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:48:28.032241 kubelet[2533]: I1213 01:48:28.032195 2533 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:48:28.043129 kubelet[2533]: E1213 01:48:28.043100 2533 kubelet.go:1462] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:48:28.044067 kubelet[2533]: I1213 01:48:28.044045 2533 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:48:28.084728 kubelet[2533]: I1213 01:48:28.084692 2533 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:48:28.084728 kubelet[2533]: I1213 01:48:28.084716 2533 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:48:28.084728 kubelet[2533]: I1213 01:48:28.084738 2533 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:48:28.084988 kubelet[2533]: I1213 01:48:28.084910 2533 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 01:48:28.084988 kubelet[2533]: I1213 01:48:28.084936 2533 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 01:48:28.084988 kubelet[2533]: I1213 01:48:28.084945 2533 policy_none.go:49] "None policy: Start" Dec 13 01:48:28.085700 kubelet[2533]: I1213 01:48:28.085675 2533 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:48:28.085700 kubelet[2533]: I1213 01:48:28.085704 2533 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:48:28.085913 kubelet[2533]: I1213 01:48:28.085895 2533 state_mem.go:75] "Updated machine memory state" Dec 13 01:48:28.089621 kubelet[2533]: I1213 01:48:28.089599 2533 manager.go:479] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:48:28.088000 audit[2533]: AVC avc: denied { mac_admin } for pid=2533 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:28.088000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:48:28.088000 audit[2533]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c0006fa300 a1=c000dc9638 a2=c0006fa2d0 a3=25 items=0 ppid=1 pid=2533 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:28.088000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:48:28.090169 kubelet[2533]: I1213 01:48:28.089973 2533 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:48:28.090265 kubelet[2533]: I1213 01:48:28.090208 2533 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:48:28.119289 kubelet[2533]: I1213 01:48:28.119263 2533 kubelet_node_status.go:73] "Attempting to register node" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.122739 kubelet[2533]: I1213 01:48:28.122708 2533 topology_manager.go:215] "Topology Admit Handler" podUID="7e7c720c5c5181dad1f9979ba158e425" podNamespace="kube-system" podName="kube-apiserver-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.122881 kubelet[2533]: I1213 01:48:28.122806 2533 topology_manager.go:215] "Topology Admit Handler" podUID="55edd08a97a3e0c900376f52548df39f" podNamespace="kube-system" podName="kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.122881 kubelet[2533]: I1213 01:48:28.122853 2533 topology_manager.go:215] "Topology Admit Handler" podUID="2487bbfb520d85217088d413b8783b55" podNamespace="kube-system" podName="kube-scheduler-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.132940 kubelet[2533]: W1213 01:48:28.132888 2533 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 01:48:28.136601 kubelet[2533]: I1213 01:48:28.136569 2533 kubelet_node_status.go:112] "Node was previously registered" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.136740 kubelet[2533]: I1213 01:48:28.136659 2533 kubelet_node_status.go:76] "Successfully registered node" node="ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.136833 kubelet[2533]: W1213 01:48:28.136815 2533 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 01:48:28.219505 kubelet[2533]: I1213 01:48:28.219364 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.221610 kubelet[2533]: I1213 01:48:28.221577 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.221751 kubelet[2533]: I1213 01:48:28.221638 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/2487bbfb520d85217088d413b8783b55-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-04a43feb01\" (UID: \"2487bbfb520d85217088d413b8783b55\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.221751 kubelet[2533]: I1213 01:48:28.221672 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/7e7c720c5c5181dad1f9979ba158e425-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-04a43feb01\" (UID: \"7e7c720c5c5181dad1f9979ba158e425\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.221751 kubelet[2533]: I1213 01:48:28.221700 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.221751 kubelet[2533]: I1213 01:48:28.221727 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.221906 kubelet[2533]: I1213 01:48:28.221756 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/55edd08a97a3e0c900376f52548df39f-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-04a43feb01\" (UID: \"55edd08a97a3e0c900376f52548df39f\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.221906 kubelet[2533]: I1213 01:48:28.221782 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/7e7c720c5c5181dad1f9979ba158e425-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-04a43feb01\" (UID: \"7e7c720c5c5181dad1f9979ba158e425\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.221906 kubelet[2533]: I1213 01:48:28.221815 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/7e7c720c5c5181dad1f9979ba158e425-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-04a43feb01\" (UID: \"7e7c720c5c5181dad1f9979ba158e425\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:28.331835 kubelet[2533]: W1213 01:48:28.331790 2533 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 01:48:28.994294 kubelet[2533]: I1213 01:48:28.994252 2533 apiserver.go:52] "Watching apiserver" Dec 13 01:48:29.017342 kubelet[2533]: I1213 01:48:29.017300 2533 desired_state_of_world_populator.go:159] "Finished populating initial desired state of world" Dec 13 01:48:29.087685 kubelet[2533]: W1213 01:48:29.087651 2533 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 01:48:29.087850 kubelet[2533]: E1213 01:48:29.087743 2533 kubelet.go:1921] "Failed creating a mirror pod for" err="pods \"kube-apiserver-ci-3510.3.6-a-04a43feb01\" already exists" pod="kube-system/kube-apiserver-ci-3510.3.6-a-04a43feb01" Dec 13 01:48:29.130114 kubelet[2533]: I1213 01:48:29.130067 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-04a43feb01" podStartSLOduration=1.130000854 podStartE2EDuration="1.130000854s" podCreationTimestamp="2024-12-13 01:48:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:48:29.105210684 +0000 UTC m=+1.213325646" watchObservedRunningTime="2024-12-13 01:48:29.130000854 +0000 UTC m=+1.238115816" Dec 13 01:48:29.152852 kubelet[2533]: I1213 01:48:29.152818 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-04a43feb01" podStartSLOduration=1.152748802 podStartE2EDuration="1.152748802s" podCreationTimestamp="2024-12-13 01:48:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:48:29.130352958 +0000 UTC m=+1.238467820" watchObservedRunningTime="2024-12-13 01:48:29.152748802 +0000 UTC m=+1.260863664" Dec 13 01:48:29.171310 kubelet[2533]: I1213 01:48:29.171262 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-04a43feb01" podStartSLOduration=1.171191302 podStartE2EDuration="1.171191302s" podCreationTimestamp="2024-12-13 01:48:28 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:48:29.154136117 +0000 UTC m=+1.262250979" watchObservedRunningTime="2024-12-13 01:48:29.171191302 +0000 UTC m=+1.279306264" Dec 13 01:48:33.398200 sudo[1832]: pam_unix(sudo:session): session closed for user root Dec 13 01:48:33.396000 audit[1832]: USER_END pid=1832 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.403063 kernel: kauditd_printk_skb: 284 callbacks suppressed Dec 13 01:48:33.403184 kernel: audit: type=1106 audit(1734054513.396:790): pid=1832 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.400000 audit[1832]: CRED_DISP pid=1832 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.436038 kernel: audit: type=1104 audit(1734054513.400:791): pid=1832 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.506040 sshd[1826]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:33.506000 audit[1826]: USER_END pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:33.510087 systemd[1]: sshd@6-10.200.8.4:22-10.200.16.10:41870.service: Deactivated successfully. Dec 13 01:48:33.510986 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 01:48:33.511153 systemd[1]: session-9.scope: Consumed 4.788s CPU time. Dec 13 01:48:33.512952 systemd-logind[1397]: Session 9 logged out. Waiting for processes to exit. Dec 13 01:48:33.514258 systemd-logind[1397]: Removed session 9. Dec 13 01:48:33.506000 audit[1826]: CRED_DISP pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:33.544183 kernel: audit: type=1106 audit(1734054513.506:792): pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:33.544313 kernel: audit: type=1104 audit(1734054513.506:793): pid=1826 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:33.544340 kernel: audit: type=1131 audit(1734054513.508:794): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.4:22-10.200.16.10:41870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:33.508000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.4:22-10.200.16.10:41870 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:40.113000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 01:48:40.113000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cbd3c0 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:40.158711 kernel: audit: type=1400 audit(1734054520.113:795): avc: denied { watch } for pid=2398 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520979 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 01:48:40.158868 kernel: audit: type=1300 audit(1734054520.113:795): arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c000cbd3c0 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:48:40.179596 kernel: audit: type=1327 audit(1734054520.113:795): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:40.113000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:48:40.313925 kubelet[2533]: I1213 01:48:40.313884 2533 kuberuntime_manager.go:1529] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 01:48:40.314519 env[1410]: time="2024-12-13T01:48:40.314473713Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 01:48:40.314896 kubelet[2533]: I1213 01:48:40.314830 2533 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 01:48:40.597009 kubelet[2533]: I1213 01:48:40.596961 2533 topology_manager.go:215] "Topology Admit Handler" podUID="e35bacf3-0287-4107-91b3-798de81c96d8" podNamespace="kube-system" podName="kube-proxy-qskrs" Dec 13 01:48:40.603874 systemd[1]: Created slice kubepods-besteffort-pode35bacf3_0287_4107_91b3_798de81c96d8.slice. Dec 13 01:48:40.674928 kubelet[2533]: I1213 01:48:40.674877 2533 topology_manager.go:215] "Topology Admit Handler" podUID="6b65273a-7431-468a-88db-4ff08ab2fff9" podNamespace="tigera-operator" podName="tigera-operator-c7ccbd65-9gp6m" Dec 13 01:48:40.681130 systemd[1]: Created slice kubepods-besteffort-pod6b65273a_7431_468a_88db_4ff08ab2fff9.slice. Dec 13 01:48:40.711653 kubelet[2533]: I1213 01:48:40.711595 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/6b65273a-7431-468a-88db-4ff08ab2fff9-var-lib-calico\") pod \"tigera-operator-c7ccbd65-9gp6m\" (UID: \"6b65273a-7431-468a-88db-4ff08ab2fff9\") " pod="tigera-operator/tigera-operator-c7ccbd65-9gp6m" Dec 13 01:48:40.711653 kubelet[2533]: I1213 01:48:40.711661 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/e35bacf3-0287-4107-91b3-798de81c96d8-xtables-lock\") pod \"kube-proxy-qskrs\" (UID: \"e35bacf3-0287-4107-91b3-798de81c96d8\") " pod="kube-system/kube-proxy-qskrs" Dec 13 01:48:40.711925 kubelet[2533]: I1213 01:48:40.711702 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xxrs9\" (UniqueName: \"kubernetes.io/projected/6b65273a-7431-468a-88db-4ff08ab2fff9-kube-api-access-xxrs9\") pod \"tigera-operator-c7ccbd65-9gp6m\" (UID: \"6b65273a-7431-468a-88db-4ff08ab2fff9\") " pod="tigera-operator/tigera-operator-c7ccbd65-9gp6m" Dec 13 01:48:40.711925 kubelet[2533]: I1213 01:48:40.711761 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/e35bacf3-0287-4107-91b3-798de81c96d8-lib-modules\") pod \"kube-proxy-qskrs\" (UID: \"e35bacf3-0287-4107-91b3-798de81c96d8\") " pod="kube-system/kube-proxy-qskrs" Dec 13 01:48:40.711925 kubelet[2533]: I1213 01:48:40.711796 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/e35bacf3-0287-4107-91b3-798de81c96d8-kube-proxy\") pod \"kube-proxy-qskrs\" (UID: \"e35bacf3-0287-4107-91b3-798de81c96d8\") " pod="kube-system/kube-proxy-qskrs" Dec 13 01:48:40.711925 kubelet[2533]: I1213 01:48:40.711829 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-vs46x\" (UniqueName: \"kubernetes.io/projected/e35bacf3-0287-4107-91b3-798de81c96d8-kube-api-access-vs46x\") pod \"kube-proxy-qskrs\" (UID: \"e35bacf3-0287-4107-91b3-798de81c96d8\") " pod="kube-system/kube-proxy-qskrs" Dec 13 01:48:40.913589 env[1410]: time="2024-12-13T01:48:40.912878457Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qskrs,Uid:e35bacf3-0287-4107-91b3-798de81c96d8,Namespace:kube-system,Attempt:0,}" Dec 13 01:48:40.961237 env[1410]: time="2024-12-13T01:48:40.961159364Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:40.961237 env[1410]: time="2024-12-13T01:48:40.961199365Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:40.961237 env[1410]: time="2024-12-13T01:48:40.961213165Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:40.961656 env[1410]: time="2024-12-13T01:48:40.961611668Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c4731303d3e76b1d750c70d5e263613915ce3a2df41877315543cb1b18da5da2 pid=2626 runtime=io.containerd.runc.v2 Dec 13 01:48:40.985246 systemd[1]: Started cri-containerd-c4731303d3e76b1d750c70d5e263613915ce3a2df41877315543cb1b18da5da2.scope. Dec 13 01:48:40.988107 env[1410]: time="2024-12-13T01:48:40.988054091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-9gp6m,Uid:6b65273a-7431-468a-88db-4ff08ab2fff9,Namespace:tigera-operator,Attempt:0,}" Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.030042 kernel: audit: type=1400 audit(1734054520.999:796): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.030203 kernel: audit: type=1400 audit(1734054520.999:797): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.045478 kernel: audit: type=1400 audit(1734054520.999:798): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.064221 env[1410]: time="2024-12-13T01:48:41.064167121Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-qskrs,Uid:e35bacf3-0287-4107-91b3-798de81c96d8,Namespace:kube-system,Attempt:0,} returns sandbox id \"c4731303d3e76b1d750c70d5e263613915ce3a2df41877315543cb1b18da5da2\"" Dec 13 01:48:41.066543 kernel: audit: type=1400 audit(1734054520.999:799): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.070260 env[1410]: time="2024-12-13T01:48:41.070227471Z" level=info msg="CreateContainer within sandbox \"c4731303d3e76b1d750c70d5e263613915ce3a2df41877315543cb1b18da5da2\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.096335 kernel: audit: type=1400 audit(1734054520.999:800): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.096482 kernel: audit: type=1400 audit(1734054520.999:801): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.098114 env[1410]: time="2024-12-13T01:48:41.090921542Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:41.098114 env[1410]: time="2024-12-13T01:48:41.090955442Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:41.098114 env[1410]: time="2024-12-13T01:48:41.090965742Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:41.098114 env[1410]: time="2024-12-13T01:48:41.091167444Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/00121357d4f2d7a2bab17b5252a8754600bc720961859955f4b4662543c043f5 pid=2666 runtime=io.containerd.runc.v2 Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:40.999000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:40.999000 audit: BPF prog-id=107 op=LOAD Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.111503 kernel: audit: type=1400 audit(1734054520.999:802): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=2626 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373331333033643365373662316437353063373064356532363336 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=2626 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373331333033643365373662316437353063373064356532363336 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.003000 audit: BPF prog-id=108 op=LOAD Dec 13 01:48:41.003000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c0002daff0 items=0 ppid=2626 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.003000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373331333033643365373662316437353063373064356532363336 Dec 13 01:48:41.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.029000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.029000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.029000 audit: BPF prog-id=109 op=LOAD Dec 13 01:48:41.029000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c0002db038 items=0 ppid=2626 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.029000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373331333033643365373662316437353063373064356532363336 Dec 13 01:48:41.043000 audit: BPF prog-id=109 op=UNLOAD Dec 13 01:48:41.043000 audit: BPF prog-id=108 op=UNLOAD Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { perfmon } for pid=2637 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit[2637]: AVC avc: denied { bpf } for pid=2637 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.043000 audit: BPF prog-id=110 op=LOAD Dec 13 01:48:41.043000 audit[2637]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c0002db448 items=0 ppid=2626 pid=2637 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.043000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6334373331333033643365373662316437353063373064356532363336 Dec 13 01:48:41.122917 systemd[1]: Started cri-containerd-00121357d4f2d7a2bab17b5252a8754600bc720961859955f4b4662543c043f5.scope. Dec 13 01:48:41.140601 env[1410]: time="2024-12-13T01:48:41.140548751Z" level=info msg="CreateContainer within sandbox \"c4731303d3e76b1d750c70d5e263613915ce3a2df41877315543cb1b18da5da2\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"3ee2dc7018fc19e23bf5fd48c9d234a714f9ef5a64a1ceeb91da040164436adf\"" Dec 13 01:48:41.141637 env[1410]: time="2024-12-13T01:48:41.141603160Z" level=info msg="StartContainer for \"3ee2dc7018fc19e23bf5fd48c9d234a714f9ef5a64a1ceeb91da040164436adf\"" Dec 13 01:48:41.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.146000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.146000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.147000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.147000 audit: BPF prog-id=111 op=LOAD Dec 13 01:48:41.147000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.147000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2666 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.147000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313231333537643466326437613262616231376235323532613837 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2666 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313231333537643466326437613262616231376235323532613837 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.148000 audit: BPF prog-id=112 op=LOAD Dec 13 01:48:41.148000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00032fd00 items=0 ppid=2666 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.148000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313231333537643466326437613262616231376235323532613837 Dec 13 01:48:41.149000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.149000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.149000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.149000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.149000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.149000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.149000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.149000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.149000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.149000 audit: BPF prog-id=113 op=LOAD Dec 13 01:48:41.149000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00032fd48 items=0 ppid=2666 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.149000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313231333537643466326437613262616231376235323532613837 Dec 13 01:48:41.150000 audit: BPF prog-id=113 op=UNLOAD Dec 13 01:48:41.150000 audit: BPF prog-id=112 op=UNLOAD Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { perfmon } for pid=2677 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit[2677]: AVC avc: denied { bpf } for pid=2677 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.150000 audit: BPF prog-id=114 op=LOAD Dec 13 01:48:41.150000 audit[2677]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b2158 items=0 ppid=2666 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.150000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3030313231333537643466326437613262616231376235323532613837 Dec 13 01:48:41.172757 systemd[1]: Started cri-containerd-3ee2dc7018fc19e23bf5fd48c9d234a714f9ef5a64a1ceeb91da040164436adf.scope. Dec 13 01:48:41.200344 env[1410]: time="2024-12-13T01:48:41.200285244Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-c7ccbd65-9gp6m,Uid:6b65273a-7431-468a-88db-4ff08ab2fff9,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"00121357d4f2d7a2bab17b5252a8754600bc720961859955f4b4662543c043f5\"" Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7effb604ded8 items=0 ppid=2626 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365653264633730313866633139653233626635666434386339643233 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit: BPF prog-id=115 op=LOAD Dec 13 01:48:41.202000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c0003973d8 items=0 ppid=2626 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365653264633730313866633139653233626635666434386339643233 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.202000 audit: BPF prog-id=116 op=LOAD Dec 13 01:48:41.202000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c000397428 items=0 ppid=2626 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.202000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365653264633730313866633139653233626635666434386339643233 Dec 13 01:48:41.203000 audit: BPF prog-id=116 op=UNLOAD Dec 13 01:48:41.203000 audit: BPF prog-id=115 op=UNLOAD Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { perfmon } for pid=2699 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit[2699]: AVC avc: denied { bpf } for pid=2699 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:41.203000 audit: BPF prog-id=117 op=LOAD Dec 13 01:48:41.203000 audit[2699]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c0003974b8 items=0 ppid=2626 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.203000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3365653264633730313866633139653233626635666434386339643233 Dec 13 01:48:41.207848 env[1410]: time="2024-12-13T01:48:41.207707705Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 01:48:41.235688 env[1410]: time="2024-12-13T01:48:41.235631135Z" level=info msg="StartContainer for \"3ee2dc7018fc19e23bf5fd48c9d234a714f9ef5a64a1ceeb91da040164436adf\" returns successfully" Dec 13 01:48:41.288000 audit[2757]: NETFILTER_CFG table=mangle:44 family=10 entries=1 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.288000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff9f199b80 a2=0 a3=7fff9f199b6c items=0 ppid=2710 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.288000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:48:41.291000 audit[2756]: NETFILTER_CFG table=mangle:45 family=2 entries=1 op=nft_register_chain pid=2756 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.291000 audit[2756]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc53c27210 a2=0 a3=7ffc53c271fc items=0 ppid=2710 pid=2756 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.291000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:48:41.294000 audit[2759]: NETFILTER_CFG table=nat:46 family=2 entries=1 op=nft_register_chain pid=2759 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.294000 audit[2759]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffce3a94e50 a2=0 a3=7ffce3a94e3c items=0 ppid=2710 pid=2759 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.294000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:48:41.296000 audit[2761]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.296000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd12847d60 a2=0 a3=7ffd12847d4c items=0 ppid=2710 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.296000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:48:41.297000 audit[2760]: NETFILTER_CFG table=nat:48 family=10 entries=1 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.297000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe9b5cc850 a2=0 a3=8c6d31dfdbfa5fbc items=0 ppid=2710 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.297000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:48:41.298000 audit[2762]: NETFILTER_CFG table=filter:49 family=10 entries=1 op=nft_register_chain pid=2762 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.298000 audit[2762]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc1d7e1a10 a2=0 a3=7ffc1d7e19fc items=0 ppid=2710 pid=2762 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.298000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:48:41.390000 audit[2763]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.390000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe5846c8a0 a2=0 a3=7ffe5846c88c items=0 ppid=2710 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.390000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:48:41.393000 audit[2765]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_rule pid=2765 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.393000 audit[2765]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffe6c625580 a2=0 a3=7ffe6c62556c items=0 ppid=2710 pid=2765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.393000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 01:48:41.397000 audit[2768]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2768 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.397000 audit[2768]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffc3211ab80 a2=0 a3=7ffc3211ab6c items=0 ppid=2710 pid=2768 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.397000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 01:48:41.399000 audit[2769]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2769 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.399000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd59a2d180 a2=0 a3=7ffd59a2d16c items=0 ppid=2710 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.399000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:48:41.401000 audit[2771]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.401000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fff22058990 a2=0 a3=7fff2205897c items=0 ppid=2710 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.401000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:48:41.403000 audit[2772]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_chain pid=2772 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.403000 audit[2772]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffed4996ce0 a2=0 a3=7ffed4996ccc items=0 ppid=2710 pid=2772 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.403000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:48:41.405000 audit[2774]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_rule pid=2774 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.405000 audit[2774]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffdc2be5530 a2=0 a3=7ffdc2be551c items=0 ppid=2710 pid=2774 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.405000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:48:41.409000 audit[2777]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2777 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.409000 audit[2777]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd4a52fd50 a2=0 a3=7ffd4a52fd3c items=0 ppid=2710 pid=2777 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.409000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 01:48:41.410000 audit[2778]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2778 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.410000 audit[2778]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffa22541a0 a2=0 a3=7fffa225418c items=0 ppid=2710 pid=2778 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.410000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:48:41.413000 audit[2780]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2780 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.413000 audit[2780]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffea4f98bc0 a2=0 a3=7ffea4f98bac items=0 ppid=2710 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.413000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:48:41.414000 audit[2781]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_chain pid=2781 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.414000 audit[2781]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdb5574b30 a2=0 a3=7ffdb5574b1c items=0 ppid=2710 pid=2781 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.414000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:48:41.417000 audit[2783]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2783 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.417000 audit[2783]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffe4b918680 a2=0 a3=7ffe4b91866c items=0 ppid=2710 pid=2783 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.417000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:48:41.420000 audit[2786]: NETFILTER_CFG table=filter:62 family=2 entries=1 op=nft_register_rule pid=2786 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.420000 audit[2786]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc89cdff00 a2=0 a3=7ffc89cdfeec items=0 ppid=2710 pid=2786 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.420000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:48:41.424000 audit[2789]: NETFILTER_CFG table=filter:63 family=2 entries=1 op=nft_register_rule pid=2789 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.424000 audit[2789]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd271ab10 a2=0 a3=7ffdd271aafc items=0 ppid=2710 pid=2789 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.424000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:48:41.426000 audit[2790]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_chain pid=2790 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.426000 audit[2790]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe8813fc0 a2=0 a3=7fffe8813fac items=0 ppid=2710 pid=2790 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.426000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:48:41.428000 audit[2792]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_rule pid=2792 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.428000 audit[2792]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffc448a01d0 a2=0 a3=7ffc448a01bc items=0 ppid=2710 pid=2792 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.428000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:48:41.433000 audit[2795]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2795 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.433000 audit[2795]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe397dff30 a2=0 a3=7ffe397dff1c items=0 ppid=2710 pid=2795 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.433000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:48:41.435000 audit[2796]: NETFILTER_CFG table=nat:67 family=2 entries=1 op=nft_register_chain pid=2796 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.435000 audit[2796]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff5439eb70 a2=0 a3=7fff5439eb5c items=0 ppid=2710 pid=2796 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.435000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:48:41.437000 audit[2798]: NETFILTER_CFG table=nat:68 family=2 entries=1 op=nft_register_rule pid=2798 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:41.437000 audit[2798]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffe771b5d10 a2=0 a3=7ffe771b5cfc items=0 ppid=2710 pid=2798 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.437000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:48:41.518000 audit[2804]: NETFILTER_CFG table=filter:69 family=2 entries=8 op=nft_register_rule pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:41.518000 audit[2804]: SYSCALL arch=c000003e syscall=46 success=yes exit=5164 a0=3 a1=7fff26cd7e60 a2=0 a3=7fff26cd7e4c items=0 ppid=2710 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.518000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:41.546000 audit[2804]: NETFILTER_CFG table=nat:70 family=2 entries=14 op=nft_register_chain pid=2804 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:41.546000 audit[2804]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7fff26cd7e60 a2=0 a3=7fff26cd7e4c items=0 ppid=2710 pid=2804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.546000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:41.548000 audit[2809]: NETFILTER_CFG table=filter:71 family=10 entries=1 op=nft_register_chain pid=2809 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.548000 audit[2809]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe1f5c1b00 a2=0 a3=7ffe1f5c1aec items=0 ppid=2710 pid=2809 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.548000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:48:41.551000 audit[2811]: NETFILTER_CFG table=filter:72 family=10 entries=2 op=nft_register_chain pid=2811 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.551000 audit[2811]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffc620a8850 a2=0 a3=7ffc620a883c items=0 ppid=2710 pid=2811 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.551000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 01:48:41.555000 audit[2814]: NETFILTER_CFG table=filter:73 family=10 entries=2 op=nft_register_chain pid=2814 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.555000 audit[2814]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe105c8360 a2=0 a3=7ffe105c834c items=0 ppid=2710 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.555000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 01:48:41.556000 audit[2815]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2815 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.556000 audit[2815]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd3f5c28e0 a2=0 a3=7ffd3f5c28cc items=0 ppid=2710 pid=2815 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.556000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:48:41.559000 audit[2817]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2817 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.559000 audit[2817]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc1b988450 a2=0 a3=7ffc1b98843c items=0 ppid=2710 pid=2817 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.559000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:48:41.560000 audit[2818]: NETFILTER_CFG table=filter:76 family=10 entries=1 op=nft_register_chain pid=2818 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.560000 audit[2818]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffc98107e0 a2=0 a3=7fffc98107cc items=0 ppid=2710 pid=2818 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.560000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:48:41.563000 audit[2820]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_rule pid=2820 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.563000 audit[2820]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7fffaa678b60 a2=0 a3=7fffaa678b4c items=0 ppid=2710 pid=2820 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.563000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 01:48:41.569000 audit[2823]: NETFILTER_CFG table=filter:78 family=10 entries=2 op=nft_register_chain pid=2823 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.569000 audit[2823]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffe20d9ba10 a2=0 a3=7ffe20d9b9fc items=0 ppid=2710 pid=2823 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.569000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:48:41.570000 audit[2824]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2824 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.570000 audit[2824]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe5379b5a0 a2=0 a3=7ffe5379b58c items=0 ppid=2710 pid=2824 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.570000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:48:41.573000 audit[2826]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2826 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.573000 audit[2826]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7fffe78c0950 a2=0 a3=7fffe78c093c items=0 ppid=2710 pid=2826 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.573000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:48:41.574000 audit[2827]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_chain pid=2827 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.574000 audit[2827]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fffa0a0e6b0 a2=0 a3=7fffa0a0e69c items=0 ppid=2710 pid=2827 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.574000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:48:41.578000 audit[2829]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2829 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.578000 audit[2829]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd7eb25050 a2=0 a3=7ffd7eb2503c items=0 ppid=2710 pid=2829 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.578000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:48:41.582000 audit[2832]: NETFILTER_CFG table=filter:83 family=10 entries=1 op=nft_register_rule pid=2832 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.582000 audit[2832]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd4fc04b0 a2=0 a3=7ffdd4fc049c items=0 ppid=2710 pid=2832 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.582000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:48:41.586000 audit[2835]: NETFILTER_CFG table=filter:84 family=10 entries=1 op=nft_register_rule pid=2835 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.586000 audit[2835]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff3dd1d180 a2=0 a3=7fff3dd1d16c items=0 ppid=2710 pid=2835 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 01:48:41.587000 audit[2836]: NETFILTER_CFG table=nat:85 family=10 entries=1 op=nft_register_chain pid=2836 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.587000 audit[2836]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffec97f7320 a2=0 a3=7ffec97f730c items=0 ppid=2710 pid=2836 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.587000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:48:41.590000 audit[2838]: NETFILTER_CFG table=nat:86 family=10 entries=2 op=nft_register_chain pid=2838 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.590000 audit[2838]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7fff37c370c0 a2=0 a3=7fff37c370ac items=0 ppid=2710 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.590000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:48:41.593000 audit[2841]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2841 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.593000 audit[2841]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7fff64d167b0 a2=0 a3=7fff64d1679c items=0 ppid=2710 pid=2841 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.593000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:48:41.595000 audit[2842]: NETFILTER_CFG table=nat:88 family=10 entries=1 op=nft_register_chain pid=2842 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.595000 audit[2842]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffffdf7fab0 a2=0 a3=7ffffdf7fa9c items=0 ppid=2710 pid=2842 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.595000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:48:41.597000 audit[2844]: NETFILTER_CFG table=nat:89 family=10 entries=2 op=nft_register_chain pid=2844 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.597000 audit[2844]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffe3654d300 a2=0 a3=7ffe3654d2ec items=0 ppid=2710 pid=2844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.597000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:48:41.598000 audit[2845]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_chain pid=2845 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.598000 audit[2845]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe1bb8e380 a2=0 a3=7ffe1bb8e36c items=0 ppid=2710 pid=2845 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.598000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:48:41.601000 audit[2847]: NETFILTER_CFG table=filter:91 family=10 entries=1 op=nft_register_rule pid=2847 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.601000 audit[2847]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffc3c36a390 a2=0 a3=7ffc3c36a37c items=0 ppid=2710 pid=2847 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.601000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:48:41.604000 audit[2850]: NETFILTER_CFG table=filter:92 family=10 entries=1 op=nft_register_rule pid=2850 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:48:41.604000 audit[2850]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd791a7800 a2=0 a3=7ffd791a77ec items=0 ppid=2710 pid=2850 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.604000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:48:41.608000 audit[2852]: NETFILTER_CFG table=filter:93 family=10 entries=3 op=nft_register_rule pid=2852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:48:41.608000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=2004 a0=3 a1=7ffe675d31e0 a2=0 a3=7ffe675d31cc items=0 ppid=2710 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.608000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:41.608000 audit[2852]: NETFILTER_CFG table=nat:94 family=10 entries=7 op=nft_register_chain pid=2852 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:48:41.608000 audit[2852]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7ffe675d31e0 a2=0 a3=7ffe675d31cc items=0 ppid=2710 pid=2852 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:41.608000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:41.830214 systemd[1]: run-containerd-runc-k8s.io-c4731303d3e76b1d750c70d5e263613915ce3a2df41877315543cb1b18da5da2-runc.t2DqNo.mount: Deactivated successfully. Dec 13 01:48:42.117966 kubelet[2533]: I1213 01:48:42.116004 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/kube-proxy-qskrs" podStartSLOduration=2.115955374 podStartE2EDuration="2.115955374s" podCreationTimestamp="2024-12-13 01:48:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:48:42.115775772 +0000 UTC m=+14.223890634" watchObservedRunningTime="2024-12-13 01:48:42.115955374 +0000 UTC m=+14.224070336" Dec 13 01:48:43.269307 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3373019767.mount: Deactivated successfully. Dec 13 01:48:44.023204 env[1410]: time="2024-12-13T01:48:44.023144880Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:44.032551 env[1410]: time="2024-12-13T01:48:44.032509352Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:44.038697 env[1410]: time="2024-12-13T01:48:44.038658400Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:44.043322 env[1410]: time="2024-12-13T01:48:44.043263435Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:44.043814 env[1410]: time="2024-12-13T01:48:44.043782639Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 01:48:44.047104 env[1410]: time="2024-12-13T01:48:44.047074065Z" level=info msg="CreateContainer within sandbox \"00121357d4f2d7a2bab17b5252a8754600bc720961859955f4b4662543c043f5\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 01:48:44.081353 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3137528911.mount: Deactivated successfully. Dec 13 01:48:44.092686 env[1410]: time="2024-12-13T01:48:44.092617917Z" level=info msg="CreateContainer within sandbox \"00121357d4f2d7a2bab17b5252a8754600bc720961859955f4b4662543c043f5\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"5e6b1bd7d558f1a50bb0a2ca46f1a48b703fa307e9eb9923159580efba58ed5d\"" Dec 13 01:48:44.094818 env[1410]: time="2024-12-13T01:48:44.093590524Z" level=info msg="StartContainer for \"5e6b1bd7d558f1a50bb0a2ca46f1a48b703fa307e9eb9923159580efba58ed5d\"" Dec 13 01:48:44.114304 systemd[1]: Started cri-containerd-5e6b1bd7d558f1a50bb0a2ca46f1a48b703fa307e9eb9923159580efba58ed5d.scope. Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.127000 audit: BPF prog-id=118 op=LOAD Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2666 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:44.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366231626437643535386631613530626230613263613436663161 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2666 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:44.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366231626437643535386631613530626230613263613436663161 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit: BPF prog-id=119 op=LOAD Dec 13 01:48:44.128000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0003d8020 items=0 ppid=2666 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:44.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366231626437643535386631613530626230613263613436663161 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit: BPF prog-id=120 op=LOAD Dec 13 01:48:44.128000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0003d8068 items=0 ppid=2666 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:44.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366231626437643535386631613530626230613263613436663161 Dec 13 01:48:44.128000 audit: BPF prog-id=120 op=UNLOAD Dec 13 01:48:44.128000 audit: BPF prog-id=119 op=UNLOAD Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { perfmon } for pid=2860 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit[2860]: AVC avc: denied { bpf } for pid=2860 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:44.128000 audit: BPF prog-id=121 op=LOAD Dec 13 01:48:44.128000 audit[2860]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003d8478 items=0 ppid=2666 pid=2860 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:44.128000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3565366231626437643535386631613530626230613263613436663161 Dec 13 01:48:44.160560 env[1410]: time="2024-12-13T01:48:44.160506241Z" level=info msg="StartContainer for \"5e6b1bd7d558f1a50bb0a2ca46f1a48b703fa307e9eb9923159580efba58ed5d\" returns successfully" Dec 13 01:48:47.340000 audit[2894]: NETFILTER_CFG table=filter:95 family=2 entries=15 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:47.346780 kernel: kauditd_printk_skb: 360 callbacks suppressed Dec 13 01:48:47.346878 kernel: audit: type=1325 audit(1734054527.340:907): table=filter:95 family=2 entries=15 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:47.340000 audit[2894]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcd0c23ee0 a2=0 a3=7ffcd0c23ecc items=0 ppid=2710 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:47.378724 kernel: audit: type=1300 audit(1734054527.340:907): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffcd0c23ee0 a2=0 a3=7ffcd0c23ecc items=0 ppid=2710 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:47.378863 kernel: audit: type=1327 audit(1734054527.340:907): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:47.340000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:47.357000 audit[2894]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:47.401263 kernel: audit: type=1325 audit(1734054527.357:908): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:47.357000 audit[2894]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcd0c23ee0 a2=0 a3=0 items=0 ppid=2710 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:47.357000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:47.432600 kernel: audit: type=1300 audit(1734054527.357:908): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcd0c23ee0 a2=0 a3=0 items=0 ppid=2710 pid=2894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:47.432752 kernel: audit: type=1327 audit(1734054527.357:908): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:47.432792 kernel: audit: type=1325 audit(1734054527.410:909): table=filter:97 family=2 entries=16 op=nft_register_rule pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:47.410000 audit[2896]: NETFILTER_CFG table=filter:97 family=2 entries=16 op=nft_register_rule pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:47.410000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffc429d680 a2=0 a3=7fffc429d66c items=0 ppid=2710 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:47.465640 kernel: audit: type=1300 audit(1734054527.410:909): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fffc429d680 a2=0 a3=7fffc429d66c items=0 ppid=2710 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:47.410000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:47.477928 kernel: audit: type=1327 audit(1734054527.410:909): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:47.482000 audit[2896]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:47.497492 kernel: audit: type=1325 audit(1734054527.482:910): table=nat:98 family=2 entries=12 op=nft_register_rule pid=2896 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:47.482000 audit[2896]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7fffc429d680 a2=0 a3=0 items=0 ppid=2710 pid=2896 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:47.482000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:47.580725 kubelet[2533]: I1213 01:48:47.580680 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="tigera-operator/tigera-operator-c7ccbd65-9gp6m" podStartSLOduration=4.738658533 podStartE2EDuration="7.580603416s" podCreationTimestamp="2024-12-13 01:48:40 +0000 UTC" firstStartedPulling="2024-12-13 01:48:41.202197259 +0000 UTC m=+13.310312121" lastFinishedPulling="2024-12-13 01:48:44.044142142 +0000 UTC m=+16.152257004" observedRunningTime="2024-12-13 01:48:45.125985082 +0000 UTC m=+17.234099944" watchObservedRunningTime="2024-12-13 01:48:47.580603416 +0000 UTC m=+19.688718378" Dec 13 01:48:47.581515 kubelet[2533]: I1213 01:48:47.581484 2533 topology_manager.go:215] "Topology Admit Handler" podUID="fe6e7cab-4f1d-4514-855e-fce60d7b4f06" podNamespace="calico-system" podName="calico-typha-7b5cd4d644-fqt4t" Dec 13 01:48:47.588912 systemd[1]: Created slice kubepods-besteffort-podfe6e7cab_4f1d_4514_855e_fce60d7b4f06.slice. Dec 13 01:48:47.666722 kubelet[2533]: I1213 01:48:47.666597 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-tigera-ca-bundle\") pod \"calico-typha-7b5cd4d644-fqt4t\" (UID: \"fe6e7cab-4f1d-4514-855e-fce60d7b4f06\") " pod="calico-system/calico-typha-7b5cd4d644-fqt4t" Dec 13 01:48:47.666902 kubelet[2533]: I1213 01:48:47.666746 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-t548f\" (UniqueName: \"kubernetes.io/projected/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-kube-api-access-t548f\") pod \"calico-typha-7b5cd4d644-fqt4t\" (UID: \"fe6e7cab-4f1d-4514-855e-fce60d7b4f06\") " pod="calico-system/calico-typha-7b5cd4d644-fqt4t" Dec 13 01:48:47.666902 kubelet[2533]: I1213 01:48:47.666813 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-typha-certs\") pod \"calico-typha-7b5cd4d644-fqt4t\" (UID: \"fe6e7cab-4f1d-4514-855e-fce60d7b4f06\") " pod="calico-system/calico-typha-7b5cd4d644-fqt4t" Dec 13 01:48:47.690545 kubelet[2533]: I1213 01:48:47.690504 2533 topology_manager.go:215] "Topology Admit Handler" podUID="14ecfa96-b557-4ab3-9583-f36c9e3aad8a" podNamespace="calico-system" podName="calico-node-l7vmv" Dec 13 01:48:47.697043 systemd[1]: Created slice kubepods-besteffort-pod14ecfa96_b557_4ab3_9583_f36c9e3aad8a.slice. Dec 13 01:48:47.767895 kubelet[2533]: I1213 01:48:47.767801 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-log-dir\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768082 kubelet[2533]: I1213 01:48:47.767916 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-flexvol-driver-host\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768082 kubelet[2533]: I1213 01:48:47.767960 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-bin-dir\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768082 kubelet[2533]: I1213 01:48:47.768019 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-net-dir\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768082 kubelet[2533]: I1213 01:48:47.768045 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-lib-modules\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768082 kubelet[2533]: I1213 01:48:47.768070 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-policysync\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768304 kubelet[2533]: I1213 01:48:47.768110 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-var-run-calico\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768304 kubelet[2533]: I1213 01:48:47.768158 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-tigera-ca-bundle\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768304 kubelet[2533]: I1213 01:48:47.768208 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-var-lib-calico\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768304 kubelet[2533]: I1213 01:48:47.768267 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-xtables-lock\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768304 kubelet[2533]: I1213 01:48:47.768297 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-node-certs\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.768523 kubelet[2533]: I1213 01:48:47.768342 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-5pmhs\" (UniqueName: \"kubernetes.io/projected/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-kube-api-access-5pmhs\") pod \"calico-node-l7vmv\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " pod="calico-system/calico-node-l7vmv" Dec 13 01:48:47.825963 kubelet[2533]: I1213 01:48:47.825914 2533 topology_manager.go:215] "Topology Admit Handler" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" podNamespace="calico-system" podName="csi-node-driver-fnbwv" Dec 13 01:48:47.826255 kubelet[2533]: E1213 01:48:47.826229 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:48:47.868800 kubelet[2533]: I1213 01:48:47.868744 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/8063720a-786c-4bc8-8fad-0cb4ea957126-kubelet-dir\") pod \"csi-node-driver-fnbwv\" (UID: \"8063720a-786c-4bc8-8fad-0cb4ea957126\") " pod="calico-system/csi-node-driver-fnbwv" Dec 13 01:48:47.868969 kubelet[2533]: I1213 01:48:47.868870 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/8063720a-786c-4bc8-8fad-0cb4ea957126-socket-dir\") pod \"csi-node-driver-fnbwv\" (UID: \"8063720a-786c-4bc8-8fad-0cb4ea957126\") " pod="calico-system/csi-node-driver-fnbwv" Dec 13 01:48:47.868969 kubelet[2533]: I1213 01:48:47.868904 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/8063720a-786c-4bc8-8fad-0cb4ea957126-registration-dir\") pod \"csi-node-driver-fnbwv\" (UID: \"8063720a-786c-4bc8-8fad-0cb4ea957126\") " pod="calico-system/csi-node-driver-fnbwv" Dec 13 01:48:47.869110 kubelet[2533]: I1213 01:48:47.869060 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/8063720a-786c-4bc8-8fad-0cb4ea957126-varrun\") pod \"csi-node-driver-fnbwv\" (UID: \"8063720a-786c-4bc8-8fad-0cb4ea957126\") " pod="calico-system/csi-node-driver-fnbwv" Dec 13 01:48:47.869212 kubelet[2533]: I1213 01:48:47.869187 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-6lv7j\" (UniqueName: \"kubernetes.io/projected/8063720a-786c-4bc8-8fad-0cb4ea957126-kube-api-access-6lv7j\") pod \"csi-node-driver-fnbwv\" (UID: \"8063720a-786c-4bc8-8fad-0cb4ea957126\") " pod="calico-system/csi-node-driver-fnbwv" Dec 13 01:48:47.872122 kubelet[2533]: E1213 01:48:47.872093 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.872122 kubelet[2533]: W1213 01:48:47.872118 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.872314 kubelet[2533]: E1213 01:48:47.872239 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.872408 kubelet[2533]: E1213 01:48:47.872394 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.872497 kubelet[2533]: W1213 01:48:47.872409 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.872594 kubelet[2533]: E1213 01:48:47.872529 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.872704 kubelet[2533]: E1213 01:48:47.872689 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.872769 kubelet[2533]: W1213 01:48:47.872705 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.872834 kubelet[2533]: E1213 01:48:47.872819 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.872988 kubelet[2533]: E1213 01:48:47.872974 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.872988 kubelet[2533]: W1213 01:48:47.872987 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.873102 kubelet[2533]: E1213 01:48:47.873072 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.873228 kubelet[2533]: E1213 01:48:47.873207 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.873347 kubelet[2533]: W1213 01:48:47.873228 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.873347 kubelet[2533]: E1213 01:48:47.873328 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.873505 kubelet[2533]: E1213 01:48:47.873465 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.880880 kubelet[2533]: W1213 01:48:47.873474 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.880880 kubelet[2533]: E1213 01:48:47.878778 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.880880 kubelet[2533]: E1213 01:48:47.878950 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.880880 kubelet[2533]: W1213 01:48:47.878960 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.880880 kubelet[2533]: E1213 01:48:47.879059 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.880880 kubelet[2533]: E1213 01:48:47.879267 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.880880 kubelet[2533]: W1213 01:48:47.879278 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.880880 kubelet[2533]: E1213 01:48:47.879373 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.880880 kubelet[2533]: E1213 01:48:47.879561 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.880880 kubelet[2533]: W1213 01:48:47.879570 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.881306 kubelet[2533]: E1213 01:48:47.879768 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.881306 kubelet[2533]: E1213 01:48:47.880095 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.881306 kubelet[2533]: W1213 01:48:47.880109 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.881306 kubelet[2533]: E1213 01:48:47.880153 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.881306 kubelet[2533]: E1213 01:48:47.880503 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.881306 kubelet[2533]: W1213 01:48:47.880514 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.881306 kubelet[2533]: E1213 01:48:47.880541 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.887248 kubelet[2533]: E1213 01:48:47.883632 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.887248 kubelet[2533]: W1213 01:48:47.883649 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.887248 kubelet[2533]: E1213 01:48:47.883674 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.887248 kubelet[2533]: E1213 01:48:47.883863 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.887248 kubelet[2533]: W1213 01:48:47.883874 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.887248 kubelet[2533]: E1213 01:48:47.883895 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.887248 kubelet[2533]: E1213 01:48:47.884089 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.887248 kubelet[2533]: W1213 01:48:47.884099 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.887248 kubelet[2533]: E1213 01:48:47.884178 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.887248 kubelet[2533]: E1213 01:48:47.884320 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.887677 kubelet[2533]: W1213 01:48:47.884330 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.887677 kubelet[2533]: E1213 01:48:47.885231 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.887677 kubelet[2533]: E1213 01:48:47.885407 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.887677 kubelet[2533]: W1213 01:48:47.885418 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.887677 kubelet[2533]: E1213 01:48:47.885523 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.887677 kubelet[2533]: E1213 01:48:47.885652 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.887677 kubelet[2533]: W1213 01:48:47.885660 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.887677 kubelet[2533]: E1213 01:48:47.885762 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.887677 kubelet[2533]: E1213 01:48:47.885882 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.887677 kubelet[2533]: W1213 01:48:47.885890 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.887950 kubelet[2533]: E1213 01:48:47.885904 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.893249 env[1410]: time="2024-12-13T01:48:47.892927182Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b5cd4d644-fqt4t,Uid:fe6e7cab-4f1d-4514-855e-fce60d7b4f06,Namespace:calico-system,Attempt:0,}" Dec 13 01:48:47.922037 kubelet[2533]: E1213 01:48:47.918660 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.922240 kubelet[2533]: W1213 01:48:47.922216 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.922347 kubelet[2533]: E1213 01:48:47.922335 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.948492 env[1410]: time="2024-12-13T01:48:47.948411584Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:47.948684 env[1410]: time="2024-12-13T01:48:47.948480485Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:47.948684 env[1410]: time="2024-12-13T01:48:47.948495585Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:47.948684 env[1410]: time="2024-12-13T01:48:47.948637986Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b pid=2926 runtime=io.containerd.runc.v2 Dec 13 01:48:47.969543 systemd[1]: Started cri-containerd-7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b.scope. Dec 13 01:48:47.971051 kubelet[2533]: E1213 01:48:47.970343 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.971051 kubelet[2533]: W1213 01:48:47.970365 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.971051 kubelet[2533]: E1213 01:48:47.970393 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.971051 kubelet[2533]: E1213 01:48:47.970695 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.971051 kubelet[2533]: W1213 01:48:47.970708 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.971051 kubelet[2533]: E1213 01:48:47.970726 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.974585 kubelet[2533]: E1213 01:48:47.973831 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.974585 kubelet[2533]: W1213 01:48:47.973850 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.974585 kubelet[2533]: E1213 01:48:47.973873 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.974585 kubelet[2533]: E1213 01:48:47.974138 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.974585 kubelet[2533]: W1213 01:48:47.974151 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.974585 kubelet[2533]: E1213 01:48:47.974170 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.974585 kubelet[2533]: E1213 01:48:47.974389 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.974585 kubelet[2533]: W1213 01:48:47.974404 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.974585 kubelet[2533]: E1213 01:48:47.974422 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.975307 kubelet[2533]: E1213 01:48:47.975185 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.975307 kubelet[2533]: W1213 01:48:47.975201 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.975307 kubelet[2533]: E1213 01:48:47.975219 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.975669 kubelet[2533]: E1213 01:48:47.975653 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.975775 kubelet[2533]: W1213 01:48:47.975761 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.975852 kubelet[2533]: E1213 01:48:47.975843 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.976114 kubelet[2533]: E1213 01:48:47.976101 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.976212 kubelet[2533]: W1213 01:48:47.976199 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.976288 kubelet[2533]: E1213 01:48:47.976278 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.976604 kubelet[2533]: E1213 01:48:47.976589 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.976691 kubelet[2533]: W1213 01:48:47.976679 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.976763 kubelet[2533]: E1213 01:48:47.976754 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.977035 kubelet[2533]: E1213 01:48:47.977021 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.977138 kubelet[2533]: W1213 01:48:47.977125 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.977210 kubelet[2533]: E1213 01:48:47.977200 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.977516 kubelet[2533]: E1213 01:48:47.977501 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.977617 kubelet[2533]: W1213 01:48:47.977604 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.977693 kubelet[2533]: E1213 01:48:47.977683 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.977944 kubelet[2533]: E1213 01:48:47.977930 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.978053 kubelet[2533]: W1213 01:48:47.978040 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.978216 kubelet[2533]: E1213 01:48:47.978202 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.978540 kubelet[2533]: E1213 01:48:47.978525 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.978661 kubelet[2533]: W1213 01:48:47.978647 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.978753 kubelet[2533]: E1213 01:48:47.978742 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.979294 kubelet[2533]: E1213 01:48:47.979278 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.979416 kubelet[2533]: W1213 01:48:47.979398 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.979563 kubelet[2533]: E1213 01:48:47.979550 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.979815 kubelet[2533]: E1213 01:48:47.979802 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.979914 kubelet[2533]: W1213 01:48:47.979901 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.979988 kubelet[2533]: E1213 01:48:47.979979 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.980229 kubelet[2533]: E1213 01:48:47.980216 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.980332 kubelet[2533]: W1213 01:48:47.980318 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.980423 kubelet[2533]: E1213 01:48:47.980411 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.980729 kubelet[2533]: E1213 01:48:47.980716 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.980821 kubelet[2533]: W1213 01:48:47.980808 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.980903 kubelet[2533]: E1213 01:48:47.980893 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.981169 kubelet[2533]: E1213 01:48:47.981156 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.983067 kubelet[2533]: W1213 01:48:47.983050 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.983169 kubelet[2533]: E1213 01:48:47.983158 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.983427 kubelet[2533]: E1213 01:48:47.983413 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.983558 kubelet[2533]: W1213 01:48:47.983543 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.983655 kubelet[2533]: E1213 01:48:47.983644 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.983901 kubelet[2533]: E1213 01:48:47.983888 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.984000 kubelet[2533]: W1213 01:48:47.983987 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.984090 kubelet[2533]: E1213 01:48:47.984079 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.984573 kubelet[2533]: E1213 01:48:47.984557 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.984670 kubelet[2533]: W1213 01:48:47.984657 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.984760 kubelet[2533]: E1213 01:48:47.984749 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.985095 kubelet[2533]: E1213 01:48:47.985064 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.985554 kubelet[2533]: W1213 01:48:47.985537 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.985649 kubelet[2533]: E1213 01:48:47.985638 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.985906 kubelet[2533]: E1213 01:48:47.985893 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.986023 kubelet[2533]: W1213 01:48:47.986009 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.986118 kubelet[2533]: E1213 01:48:47.986107 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.986370 kubelet[2533]: E1213 01:48:47.986356 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.986525 kubelet[2533]: W1213 01:48:47.986509 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.986636 kubelet[2533]: E1213 01:48:47.986625 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:47.986922 kubelet[2533]: E1213 01:48:47.986909 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:47.987020 kubelet[2533]: W1213 01:48:47.987008 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:47.987093 kubelet[2533]: E1213 01:48:47.987084 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:48.001316 env[1410]: time="2024-12-13T01:48:48.000799464Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l7vmv,Uid:14ecfa96-b557-4ab3-9583-f36c9e3aad8a,Namespace:calico-system,Attempt:0,}" Dec 13 01:48:48.003915 kubelet[2533]: E1213 01:48:48.003874 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:48.004201 kubelet[2533]: W1213 01:48:48.004182 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:48.004327 kubelet[2533]: E1213 01:48:48.004314 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.010000 audit: BPF prog-id=122 op=LOAD Dec 13 01:48:48.011000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.011000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2926 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.011000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313366303433353063626235326666366337306335626666363063 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2926 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313366303433353063626235326666366337306335626666363063 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.012000 audit: BPF prog-id=123 op=LOAD Dec 13 01:48:48.012000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c0001de850 items=0 ppid=2926 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.012000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313366303433353063626235326666366337306335626666363063 Dec 13 01:48:48.013000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.013000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.013000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.013000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.013000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.013000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.013000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.013000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.013000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.013000 audit: BPF prog-id=124 op=LOAD Dec 13 01:48:48.013000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c0001de898 items=0 ppid=2926 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313366303433353063626235326666366337306335626666363063 Dec 13 01:48:48.014000 audit: BPF prog-id=124 op=UNLOAD Dec 13 01:48:48.014000 audit: BPF prog-id=123 op=UNLOAD Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { perfmon } for pid=2934 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit[2934]: AVC avc: denied { bpf } for pid=2934 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.014000 audit: BPF prog-id=125 op=LOAD Dec 13 01:48:48.014000 audit[2934]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c0001deca8 items=0 ppid=2926 pid=2934 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732313366303433353063626235326666366337306335626666363063 Dec 13 01:48:48.048505 env[1410]: time="2024-12-13T01:48:48.048411103Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:48:48.048789 env[1410]: time="2024-12-13T01:48:48.048757806Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:48:48.048923 env[1410]: time="2024-12-13T01:48:48.048898006Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:48:48.049217 env[1410]: time="2024-12-13T01:48:48.049177908Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a pid=2985 runtime=io.containerd.runc.v2 Dec 13 01:48:48.073974 systemd[1]: Started cri-containerd-373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a.scope. Dec 13 01:48:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.106000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.106000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.107000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.107000 audit: BPF prog-id=126 op=LOAD Dec 13 01:48:48.108000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.108000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2985 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336439663338633339386138613934366166633764643832663263 Dec 13 01:48:48.108000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.108000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2985 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.108000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336439663338633339386138613934366166633764643832663263 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit: BPF prog-id=127 op=LOAD Dec 13 01:48:48.109000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001855e0 items=0 ppid=2985 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336439663338633339386138613934366166633764643832663263 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit: BPF prog-id=128 op=LOAD Dec 13 01:48:48.109000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000185628 items=0 ppid=2985 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336439663338633339386138613934366166633764643832663263 Dec 13 01:48:48.109000 audit: BPF prog-id=128 op=UNLOAD Dec 13 01:48:48.109000 audit: BPF prog-id=127 op=UNLOAD Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { perfmon } for pid=2994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit[2994]: AVC avc: denied { bpf } for pid=2994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:48.109000 audit: BPF prog-id=129 op=LOAD Dec 13 01:48:48.109000 audit[2994]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000185a38 items=0 ppid=2985 pid=2994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.109000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3337336439663338633339386138613934366166633764643832663263 Dec 13 01:48:48.135811 env[1410]: time="2024-12-13T01:48:48.135763624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7b5cd4d644-fqt4t,Uid:fe6e7cab-4f1d-4514-855e-fce60d7b4f06,Namespace:calico-system,Attempt:0,} returns sandbox id \"7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b\"" Dec 13 01:48:48.138059 env[1410]: time="2024-12-13T01:48:48.138023440Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 01:48:48.185516 env[1410]: time="2024-12-13T01:48:48.177849423Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-l7vmv,Uid:14ecfa96-b557-4ab3-9583-f36c9e3aad8a,Namespace:calico-system,Attempt:0,} returns sandbox id \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\"" Dec 13 01:48:48.506000 audit[3029]: NETFILTER_CFG table=filter:99 family=2 entries=17 op=nft_register_rule pid=3029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:48.506000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=6652 a0=3 a1=7ffd7839b420 a2=0 a3=7ffd7839b40c items=0 ppid=2710 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.506000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:48.510000 audit[3029]: NETFILTER_CFG table=nat:100 family=2 entries=12 op=nft_register_rule pid=3029 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:48:48.510000 audit[3029]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd7839b420 a2=0 a3=0 items=0 ppid=2710 pid=3029 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:48.510000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:48:50.025683 kubelet[2533]: E1213 01:48:50.025643 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:48:50.225144 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2020707968.mount: Deactivated successfully. Dec 13 01:48:51.858600 env[1410]: time="2024-12-13T01:48:51.858521208Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:51.867576 env[1410]: time="2024-12-13T01:48:51.867528169Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:51.872746 env[1410]: time="2024-12-13T01:48:51.872702603Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:51.877262 env[1410]: time="2024-12-13T01:48:51.877220834Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:51.877684 env[1410]: time="2024-12-13T01:48:51.877648236Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 01:48:51.881403 env[1410]: time="2024-12-13T01:48:51.879139546Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 01:48:51.902173 env[1410]: time="2024-12-13T01:48:51.902126100Z" level=info msg="CreateContainer within sandbox \"7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 01:48:51.962023 env[1410]: time="2024-12-13T01:48:51.961964901Z" level=info msg="CreateContainer within sandbox \"7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\"" Dec 13 01:48:51.962786 env[1410]: time="2024-12-13T01:48:51.962740306Z" level=info msg="StartContainer for \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\"" Dec 13 01:48:51.986663 systemd[1]: Started cri-containerd-5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266.scope. Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.012000 audit: BPF prog-id=130 op=LOAD Dec 13 01:48:52.013000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.013000 audit[3040]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=2926 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:52.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616131646639333765653462343266306365663537363836626661 Dec 13 01:48:52.013000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.013000 audit[3040]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=2926 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:52.013000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616131646639333765653462343266306365663537363836626661 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit: BPF prog-id=131 op=LOAD Dec 13 01:48:52.014000 audit[3040]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c000404540 items=0 ppid=2926 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:52.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616131646639333765653462343266306365663537363836626661 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.014000 audit: BPF prog-id=132 op=LOAD Dec 13 01:48:52.014000 audit[3040]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c000404588 items=0 ppid=2926 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:52.014000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616131646639333765653462343266306365663537363836626661 Dec 13 01:48:52.015000 audit: BPF prog-id=132 op=UNLOAD Dec 13 01:48:52.015000 audit: BPF prog-id=131 op=UNLOAD Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { perfmon } for pid=3040 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit[3040]: AVC avc: denied { bpf } for pid=3040 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:52.015000 audit: BPF prog-id=133 op=LOAD Dec 13 01:48:52.015000 audit[3040]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c000404998 items=0 ppid=2926 pid=3040 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:52.015000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3566616131646639333765653462343266306365663537363836626661 Dec 13 01:48:52.024667 kubelet[2533]: E1213 01:48:52.024276 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:48:52.056870 env[1410]: time="2024-12-13T01:48:52.056811529Z" level=info msg="StartContainer for \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\" returns successfully" Dec 13 01:48:52.184204 kubelet[2533]: E1213 01:48:52.184044 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.184515 kubelet[2533]: W1213 01:48:52.184478 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.184693 kubelet[2533]: E1213 01:48:52.184677 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.187305 kubelet[2533]: E1213 01:48:52.187283 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.187466 kubelet[2533]: W1213 01:48:52.187430 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.187573 kubelet[2533]: E1213 01:48:52.187561 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.187899 kubelet[2533]: E1213 01:48:52.187886 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.188010 kubelet[2533]: W1213 01:48:52.187997 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.188161 kubelet[2533]: E1213 01:48:52.188151 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.188491 kubelet[2533]: E1213 01:48:52.188477 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.188608 kubelet[2533]: W1213 01:48:52.188595 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.188703 kubelet[2533]: E1213 01:48:52.188693 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.189005 kubelet[2533]: E1213 01:48:52.188993 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.189119 kubelet[2533]: W1213 01:48:52.189106 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.189227 kubelet[2533]: E1213 01:48:52.189216 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.189527 kubelet[2533]: E1213 01:48:52.189513 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.189641 kubelet[2533]: W1213 01:48:52.189629 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.189731 kubelet[2533]: E1213 01:48:52.189722 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.190011 kubelet[2533]: E1213 01:48:52.189999 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.190106 kubelet[2533]: W1213 01:48:52.190095 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.190187 kubelet[2533]: E1213 01:48:52.190178 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.190458 kubelet[2533]: E1213 01:48:52.190435 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.190574 kubelet[2533]: W1213 01:48:52.190562 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.190653 kubelet[2533]: E1213 01:48:52.190644 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.190919 kubelet[2533]: E1213 01:48:52.190907 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.191031 kubelet[2533]: W1213 01:48:52.191019 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.191112 kubelet[2533]: E1213 01:48:52.191104 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.191358 kubelet[2533]: E1213 01:48:52.191347 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.191444 kubelet[2533]: W1213 01:48:52.191433 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.191578 kubelet[2533]: E1213 01:48:52.191568 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.191833 kubelet[2533]: E1213 01:48:52.191820 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.191926 kubelet[2533]: W1213 01:48:52.191915 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.192007 kubelet[2533]: E1213 01:48:52.191998 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.192262 kubelet[2533]: E1213 01:48:52.192251 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.192350 kubelet[2533]: W1213 01:48:52.192340 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.192426 kubelet[2533]: E1213 01:48:52.192416 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.194555 kubelet[2533]: E1213 01:48:52.194540 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.194665 kubelet[2533]: W1213 01:48:52.194653 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.194753 kubelet[2533]: E1213 01:48:52.194743 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.195005 kubelet[2533]: E1213 01:48:52.194993 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.195127 kubelet[2533]: W1213 01:48:52.195114 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.195224 kubelet[2533]: E1213 01:48:52.195214 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.196697 kubelet[2533]: E1213 01:48:52.196682 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.196798 kubelet[2533]: W1213 01:48:52.196785 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.196890 kubelet[2533]: E1213 01:48:52.196880 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.210412 kubelet[2533]: E1213 01:48:52.210386 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.210412 kubelet[2533]: W1213 01:48:52.210408 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.210611 kubelet[2533]: E1213 01:48:52.210430 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.210740 kubelet[2533]: E1213 01:48:52.210718 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.210740 kubelet[2533]: W1213 01:48:52.210739 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.210929 kubelet[2533]: E1213 01:48:52.210761 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.213315 kubelet[2533]: E1213 01:48:52.213294 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.213315 kubelet[2533]: W1213 01:48:52.213314 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.213478 kubelet[2533]: E1213 01:48:52.213335 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.213735 kubelet[2533]: E1213 01:48:52.213709 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.213825 kubelet[2533]: W1213 01:48:52.213737 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.213893 kubelet[2533]: E1213 01:48:52.213841 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.214000 kubelet[2533]: E1213 01:48:52.213985 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.214080 kubelet[2533]: W1213 01:48:52.214000 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.214146 kubelet[2533]: E1213 01:48:52.214093 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.214237 kubelet[2533]: E1213 01:48:52.214222 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.214312 kubelet[2533]: W1213 01:48:52.214237 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.214380 kubelet[2533]: E1213 01:48:52.214338 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.214521 kubelet[2533]: E1213 01:48:52.214496 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.214521 kubelet[2533]: W1213 01:48:52.214512 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.214649 kubelet[2533]: E1213 01:48:52.214531 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.214747 kubelet[2533]: E1213 01:48:52.214732 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.214747 kubelet[2533]: W1213 01:48:52.214747 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.214865 kubelet[2533]: E1213 01:48:52.214766 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.215021 kubelet[2533]: E1213 01:48:52.214993 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.215021 kubelet[2533]: W1213 01:48:52.215010 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.215139 kubelet[2533]: E1213 01:48:52.215029 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.215422 kubelet[2533]: E1213 01:48:52.215401 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.215422 kubelet[2533]: W1213 01:48:52.215419 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.215595 kubelet[2533]: E1213 01:48:52.215527 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.215671 kubelet[2533]: E1213 01:48:52.215661 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.215728 kubelet[2533]: W1213 01:48:52.215672 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.215795 kubelet[2533]: E1213 01:48:52.215765 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.215898 kubelet[2533]: E1213 01:48:52.215882 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.215976 kubelet[2533]: W1213 01:48:52.215898 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.215976 kubelet[2533]: E1213 01:48:52.215917 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.216129 kubelet[2533]: E1213 01:48:52.216113 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.216129 kubelet[2533]: W1213 01:48:52.216129 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.216240 kubelet[2533]: E1213 01:48:52.216149 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.216397 kubelet[2533]: E1213 01:48:52.216382 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.216397 kubelet[2533]: W1213 01:48:52.216395 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.216555 kubelet[2533]: E1213 01:48:52.216414 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.216857 kubelet[2533]: E1213 01:48:52.216835 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.216857 kubelet[2533]: W1213 01:48:52.216853 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.216998 kubelet[2533]: E1213 01:48:52.216873 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.217106 kubelet[2533]: E1213 01:48:52.217089 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.217106 kubelet[2533]: W1213 01:48:52.217105 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.217243 kubelet[2533]: E1213 01:48:52.217121 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.217336 kubelet[2533]: E1213 01:48:52.217319 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.217336 kubelet[2533]: W1213 01:48:52.217336 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.217479 kubelet[2533]: E1213 01:48:52.217351 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.217944 kubelet[2533]: E1213 01:48:52.217922 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:52.217944 kubelet[2533]: W1213 01:48:52.217943 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:52.218067 kubelet[2533]: E1213 01:48:52.217959 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:52.886063 systemd[1]: run-containerd-runc-k8s.io-5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266-runc.N2vGR8.mount: Deactivated successfully. Dec 13 01:48:53.133163 kubelet[2533]: I1213 01:48:53.133132 2533 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:48:53.202493 kubelet[2533]: E1213 01:48:53.202155 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.202493 kubelet[2533]: W1213 01:48:53.202186 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.202493 kubelet[2533]: E1213 01:48:53.202214 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.202493 kubelet[2533]: E1213 01:48:53.202403 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.202493 kubelet[2533]: W1213 01:48:53.202416 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.202493 kubelet[2533]: E1213 01:48:53.202432 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.202925 kubelet[2533]: E1213 01:48:53.202751 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.202925 kubelet[2533]: W1213 01:48:53.202766 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.202925 kubelet[2533]: E1213 01:48:53.202783 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.203069 kubelet[2533]: E1213 01:48:53.202947 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.203069 kubelet[2533]: W1213 01:48:53.202957 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.203069 kubelet[2533]: E1213 01:48:53.202972 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.203265 kubelet[2533]: E1213 01:48:53.203156 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.203265 kubelet[2533]: W1213 01:48:53.203167 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.203265 kubelet[2533]: E1213 01:48:53.203182 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.203407 kubelet[2533]: E1213 01:48:53.203346 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.203407 kubelet[2533]: W1213 01:48:53.203356 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.203407 kubelet[2533]: E1213 01:48:53.203370 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.203627 kubelet[2533]: E1213 01:48:53.203608 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.203692 kubelet[2533]: W1213 01:48:53.203627 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.203692 kubelet[2533]: E1213 01:48:53.203645 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.203829 kubelet[2533]: E1213 01:48:53.203815 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.203881 kubelet[2533]: W1213 01:48:53.203830 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.203881 kubelet[2533]: E1213 01:48:53.203845 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.204038 kubelet[2533]: E1213 01:48:53.204023 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.204099 kubelet[2533]: W1213 01:48:53.204039 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.204099 kubelet[2533]: E1213 01:48:53.204054 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.204251 kubelet[2533]: E1213 01:48:53.204213 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.204251 kubelet[2533]: W1213 01:48:53.204223 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.204251 kubelet[2533]: E1213 01:48:53.204238 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.204428 kubelet[2533]: E1213 01:48:53.204407 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.204428 kubelet[2533]: W1213 01:48:53.204423 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.204561 kubelet[2533]: E1213 01:48:53.204438 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.204757 kubelet[2533]: E1213 01:48:53.204740 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.204757 kubelet[2533]: W1213 01:48:53.204753 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.204895 kubelet[2533]: E1213 01:48:53.204769 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.204975 kubelet[2533]: E1213 01:48:53.204957 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.204975 kubelet[2533]: W1213 01:48:53.204971 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.205096 kubelet[2533]: E1213 01:48:53.204987 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.205175 kubelet[2533]: E1213 01:48:53.205158 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.205175 kubelet[2533]: W1213 01:48:53.205172 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.205267 kubelet[2533]: E1213 01:48:53.205186 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.205528 kubelet[2533]: E1213 01:48:53.205514 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.205633 kubelet[2533]: W1213 01:48:53.205610 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.205702 kubelet[2533]: E1213 01:48:53.205634 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.221054 kubelet[2533]: E1213 01:48:53.221020 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.221054 kubelet[2533]: W1213 01:48:53.221047 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.221298 kubelet[2533]: E1213 01:48:53.221076 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.221395 kubelet[2533]: E1213 01:48:53.221377 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.221473 kubelet[2533]: W1213 01:48:53.221395 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.221473 kubelet[2533]: E1213 01:48:53.221418 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.221758 kubelet[2533]: E1213 01:48:53.221739 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.221758 kubelet[2533]: W1213 01:48:53.221756 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.221900 kubelet[2533]: E1213 01:48:53.221777 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.222066 kubelet[2533]: E1213 01:48:53.222047 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.222132 kubelet[2533]: W1213 01:48:53.222066 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.222132 kubelet[2533]: E1213 01:48:53.222089 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.222322 kubelet[2533]: E1213 01:48:53.222305 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.222322 kubelet[2533]: W1213 01:48:53.222321 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.222459 kubelet[2533]: E1213 01:48:53.222341 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.222560 kubelet[2533]: E1213 01:48:53.222544 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.222622 kubelet[2533]: W1213 01:48:53.222560 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.222622 kubelet[2533]: E1213 01:48:53.222579 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.222888 kubelet[2533]: E1213 01:48:53.222870 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.222888 kubelet[2533]: W1213 01:48:53.222888 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.223017 kubelet[2533]: E1213 01:48:53.222979 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.223337 kubelet[2533]: E1213 01:48:53.223317 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.223337 kubelet[2533]: W1213 01:48:53.223334 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.223509 kubelet[2533]: E1213 01:48:53.223433 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.223655 kubelet[2533]: E1213 01:48:53.223620 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.223728 kubelet[2533]: W1213 01:48:53.223655 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.223783 kubelet[2533]: E1213 01:48:53.223734 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.223974 kubelet[2533]: E1213 01:48:53.223956 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.223974 kubelet[2533]: W1213 01:48:53.223973 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.224107 kubelet[2533]: E1213 01:48:53.224002 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.224223 kubelet[2533]: E1213 01:48:53.224206 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.224301 kubelet[2533]: W1213 01:48:53.224224 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.224301 kubelet[2533]: E1213 01:48:53.224243 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.224542 kubelet[2533]: E1213 01:48:53.224498 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.224542 kubelet[2533]: W1213 01:48:53.224514 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.224542 kubelet[2533]: E1213 01:48:53.224534 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.224837 kubelet[2533]: E1213 01:48:53.224820 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.224837 kubelet[2533]: W1213 01:48:53.224837 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.224961 kubelet[2533]: E1213 01:48:53.224856 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.225611 kubelet[2533]: E1213 01:48:53.225589 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.225704 kubelet[2533]: W1213 01:48:53.225623 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.225704 kubelet[2533]: E1213 01:48:53.225645 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.225918 kubelet[2533]: E1213 01:48:53.225902 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.225918 kubelet[2533]: W1213 01:48:53.225918 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.226032 kubelet[2533]: E1213 01:48:53.225962 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.226251 kubelet[2533]: E1213 01:48:53.226235 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.226251 kubelet[2533]: W1213 01:48:53.226251 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.226426 kubelet[2533]: E1213 01:48:53.226271 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.226822 kubelet[2533]: E1213 01:48:53.226802 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.226822 kubelet[2533]: W1213 01:48:53.226820 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.226972 kubelet[2533]: E1213 01:48:53.226840 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.227054 kubelet[2533]: E1213 01:48:53.227035 2533 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:48:53.227108 kubelet[2533]: W1213 01:48:53.227055 2533 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:48:53.227108 kubelet[2533]: E1213 01:48:53.227070 2533 plugins.go:730] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:48:53.830940 env[1410]: time="2024-12-13T01:48:53.830886869Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:53.841182 env[1410]: time="2024-12-13T01:48:53.841136335Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:53.845895 env[1410]: time="2024-12-13T01:48:53.845856065Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:53.852887 env[1410]: time="2024-12-13T01:48:53.852849710Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:53.853379 env[1410]: time="2024-12-13T01:48:53.853344713Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 01:48:53.855851 env[1410]: time="2024-12-13T01:48:53.855812329Z" level=info msg="CreateContainer within sandbox \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 01:48:53.899351 env[1410]: time="2024-12-13T01:48:53.899299009Z" level=info msg="CreateContainer within sandbox \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\"" Dec 13 01:48:53.901165 env[1410]: time="2024-12-13T01:48:53.900060914Z" level=info msg="StartContainer for \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\"" Dec 13 01:48:53.939943 systemd[1]: run-containerd-runc-k8s.io-b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5-runc.HuR9Qd.mount: Deactivated successfully. Dec 13 01:48:53.943058 systemd[1]: Started cri-containerd-b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5.scope. Dec 13 01:48:53.959000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.965390 kernel: kauditd_printk_skb: 179 callbacks suppressed Dec 13 01:48:53.965514 kernel: audit: type=1400 audit(1734054533.959:967): avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.959000 audit[3144]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb68ccd6518 items=0 ppid=2985 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:54.003549 kernel: audit: type=1300 audit(1734054533.959:967): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001976b0 a2=3c a3=7fb68ccd6518 items=0 ppid=2985 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.959000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396463313836663332646532343439323235663236393131326632 Dec 13 01:48:54.037404 kernel: audit: type=1327 audit(1734054533.959:967): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396463313836663332646532343439323235663236393131326632 Dec 13 01:48:54.037639 kernel: audit: type=1400 audit(1734054533.963:968): avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:54.037784 kubelet[2533]: E1213 01:48:54.027980 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:54.066983 kernel: audit: type=1400 audit(1734054533.963:968): avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:54.067076 kernel: audit: type=1400 audit(1734054533.963:968): avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:54.067875 systemd[1]: cri-containerd-b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5.scope: Deactivated successfully. Dec 13 01:48:54.081046 kernel: audit: type=1400 audit(1734054533.963:968): avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:54.081121 kernel: audit: type=1400 audit(1734054533.963:968): avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:54.090661 env[1410]: time="2024-12-13T01:48:54.090612730Z" level=info msg="StartContainer for \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\" returns successfully" Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:54.114588 kernel: audit: type=1400 audit(1734054533.963:968): avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:54.114679 kernel: audit: type=1400 audit(1734054533.963:968): avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:54.113891 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5-rootfs.mount: Deactivated successfully. Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.963000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.963000 audit: BPF prog-id=134 op=LOAD Dec 13 01:48:53.963000 audit[3144]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001979d8 a2=78 a3=c00026fd68 items=0 ppid=2985 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.963000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396463313836663332646532343439323235663236393131326632 Dec 13 01:48:53.978000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.978000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.978000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.978000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.978000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.978000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.978000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.978000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.978000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.978000 audit: BPF prog-id=135 op=LOAD Dec 13 01:48:53.978000 audit[3144]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000197770 a2=78 a3=c00026fdb8 items=0 ppid=2985 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.978000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396463313836663332646532343439323235663236393131326632 Dec 13 01:48:53.978000 audit: BPF prog-id=135 op=UNLOAD Dec 13 01:48:53.979000 audit: BPF prog-id=134 op=UNLOAD Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { perfmon } for pid=3144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit[3144]: AVC avc: denied { bpf } for pid=3144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:48:53.979000 audit: BPF prog-id=136 op=LOAD Dec 13 01:48:53.979000 audit[3144]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000197c30 a2=78 a3=c00026fe48 items=0 ppid=2985 pid=3144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.979000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234396463313836663332646532343439323235663236393131326632 Dec 13 01:48:54.097000 audit: BPF prog-id=136 op=UNLOAD Dec 13 01:48:54.154108 kubelet[2533]: I1213 01:48:54.153632 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-typha-7b5cd4d644-fqt4t" podStartSLOduration=3.412796724 podStartE2EDuration="7.153576928s" podCreationTimestamp="2024-12-13 01:48:47 +0000 UTC" firstStartedPulling="2024-12-13 01:48:48.137415336 +0000 UTC m=+20.245530198" lastFinishedPulling="2024-12-13 01:48:51.87819554 +0000 UTC m=+23.986310402" observedRunningTime="2024-12-13 01:48:52.175159305 +0000 UTC m=+24.283274267" watchObservedRunningTime="2024-12-13 01:48:54.153576928 +0000 UTC m=+26.261691790" Dec 13 01:48:55.409087 env[1410]: time="2024-12-13T01:48:55.409010109Z" level=info msg="shim disconnected" id=b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5 Dec 13 01:48:55.409087 env[1410]: time="2024-12-13T01:48:55.409079809Z" level=warning msg="cleaning up after shim disconnected" id=b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5 namespace=k8s.io Dec 13 01:48:55.409087 env[1410]: time="2024-12-13T01:48:55.409095010Z" level=info msg="cleaning up dead shim" Dec 13 01:48:55.418993 env[1410]: time="2024-12-13T01:48:55.418931370Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:48:55Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3187 runtime=io.containerd.runc.v2\n" Dec 13 01:48:56.023026 kubelet[2533]: E1213 01:48:56.022971 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:48:56.144728 env[1410]: time="2024-12-13T01:48:56.143110843Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 01:48:58.022908 kubelet[2533]: E1213 01:48:58.022508 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:49:00.023165 kubelet[2533]: E1213 01:49:00.023126 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:49:01.697364 env[1410]: time="2024-12-13T01:49:01.697295098Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.706323 env[1410]: time="2024-12-13T01:49:01.706281048Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.712011 env[1410]: time="2024-12-13T01:49:01.711970780Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.718075 env[1410]: time="2024-12-13T01:49:01.718041113Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.718510 env[1410]: time="2024-12-13T01:49:01.718474616Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 01:49:01.721571 env[1410]: time="2024-12-13T01:49:01.721534233Z" level=info msg="CreateContainer within sandbox \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 01:49:01.768075 env[1410]: time="2024-12-13T01:49:01.768030791Z" level=info msg="CreateContainer within sandbox \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\"" Dec 13 01:49:01.769849 env[1410]: time="2024-12-13T01:49:01.768650595Z" level=info msg="StartContainer for \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\"" Dec 13 01:49:01.805410 systemd[1]: Started cri-containerd-3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8.scope. Dec 13 01:49:01.839070 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 01:49:01.839233 kernel: audit: type=1400 audit(1734054541.819:974): avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7fdf386a2f58 items=0 ppid=2985 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366435396436346137316232363964616131396438396630303337 Dec 13 01:49:01.880031 kernel: audit: type=1300 audit(1734054541.819:974): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bf6b0 a2=3c a3=7fdf386a2f58 items=0 ppid=2985 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.880190 kernel: audit: type=1327 audit(1734054541.819:974): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366435396436346137316232363964616131396438396630303337 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.897485 kernel: audit: type=1400 audit(1734054541.819:975): avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.897571 kernel: audit: type=1400 audit(1734054541.819:975): avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.924409 kernel: audit: type=1400 audit(1734054541.819:975): avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.940389 env[1410]: time="2024-12-13T01:49:01.940348450Z" level=info msg="StartContainer for \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\" returns successfully" Dec 13 01:49:01.953761 kernel: audit: type=1400 audit(1734054541.819:975): avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.953878 kernel: audit: type=1400 audit(1734054541.819:975): avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.953908 kernel: audit: type=1400 audit(1734054541.819:975): avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.967634 kernel: audit: type=1400 audit(1734054541.819:975): avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.819000 audit: BPF prog-id=137 op=LOAD Dec 13 01:49:01.819000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bf9d8 a2=78 a3=c000358598 items=0 ppid=2985 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.819000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366435396436346137316232363964616131396438396630303337 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit: BPF prog-id=138 op=LOAD Dec 13 01:49:01.838000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bf770 a2=78 a3=c0003585e8 items=0 ppid=2985 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366435396436346137316232363964616131396438396630303337 Dec 13 01:49:01.838000 audit: BPF prog-id=138 op=UNLOAD Dec 13 01:49:01.838000 audit: BPF prog-id=137 op=UNLOAD Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { perfmon } for pid=3209 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit[3209]: AVC avc: denied { bpf } for pid=3209 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:01.838000 audit: BPF prog-id=139 op=LOAD Dec 13 01:49:01.838000 audit[3209]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bfc30 a2=78 a3=c000358678 items=0 ppid=2985 pid=3209 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:01.838000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3363366435396436346137316232363964616131396438396630303337 Dec 13 01:49:02.022847 kubelet[2533]: E1213 01:49:02.022808 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:49:03.372077 env[1410]: time="2024-12-13T01:49:03.371994952Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:49:03.374005 systemd[1]: cri-containerd-3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8.scope: Deactivated successfully. Dec 13 01:49:03.380000 audit: BPF prog-id=139 op=UNLOAD Dec 13 01:49:03.394056 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8-rootfs.mount: Deactivated successfully. Dec 13 01:49:03.444463 kubelet[2533]: I1213 01:49:03.444370 2533 kubelet_node_status.go:497] "Fast updating node status as it just became ready" Dec 13 01:49:03.938321 kubelet[2533]: I1213 01:49:03.475473 2533 topology_manager.go:215] "Topology Admit Handler" podUID="61883cf2-767f-4737-9b31-134e2368ecb8" podNamespace="calico-apiserver" podName="calico-apiserver-7887df9486-hd7sh" Dec 13 01:49:03.938321 kubelet[2533]: I1213 01:49:03.484140 2533 topology_manager.go:215] "Topology Admit Handler" podUID="e64acf22-94d3-4157-b902-e7cc7a167aa1" podNamespace="kube-system" podName="coredns-76f75df574-nw5qp" Dec 13 01:49:03.938321 kubelet[2533]: I1213 01:49:03.487164 2533 topology_manager.go:215] "Topology Admit Handler" podUID="4255679c-8178-4f78-b92e-656a9a754758" podNamespace="kube-system" podName="coredns-76f75df574-zhjgl" Dec 13 01:49:03.938321 kubelet[2533]: W1213 01:49:03.497191 2533 reflector.go:539] object-"kube-system"/"coredns": failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.6-a-04a43feb01" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.6-a-04a43feb01' and this object Dec 13 01:49:03.938321 kubelet[2533]: E1213 01:49:03.497240 2533 reflector.go:147] object-"kube-system"/"coredns": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps "coredns" is forbidden: User "system:node:ci-3510.3.6-a-04a43feb01" cannot list resource "configmaps" in API group "" in the namespace "kube-system": no relationship found between node 'ci-3510.3.6-a-04a43feb01' and this object Dec 13 01:49:03.938321 kubelet[2533]: I1213 01:49:03.506175 2533 topology_manager.go:215] "Topology Admit Handler" podUID="112d8bcc-2a50-44f8-a52e-cc27175b500a" podNamespace="calico-system" podName="calico-kube-controllers-6f89f797c7-8wmvk" Dec 13 01:49:03.938321 kubelet[2533]: I1213 01:49:03.506372 2533 topology_manager.go:215] "Topology Admit Handler" podUID="d4a264b9-878a-4af4-a4ad-8324686559fc" podNamespace="calico-apiserver" podName="calico-apiserver-7887df9486-6z9mj" Dec 13 01:49:03.482122 systemd[1]: Created slice kubepods-besteffort-pod61883cf2_767f_4737_9b31_134e2368ecb8.slice. Dec 13 01:49:03.938854 kubelet[2533]: I1213 01:49:03.512402 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/61883cf2-767f-4737-9b31-134e2368ecb8-calico-apiserver-certs\") pod \"calico-apiserver-7887df9486-hd7sh\" (UID: \"61883cf2-767f-4737-9b31-134e2368ecb8\") " pod="calico-apiserver/calico-apiserver-7887df9486-hd7sh" Dec 13 01:49:03.938854 kubelet[2533]: I1213 01:49:03.512485 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bnkf9\" (UniqueName: \"kubernetes.io/projected/e64acf22-94d3-4157-b902-e7cc7a167aa1-kube-api-access-bnkf9\") pod \"coredns-76f75df574-nw5qp\" (UID: \"e64acf22-94d3-4157-b902-e7cc7a167aa1\") " pod="kube-system/coredns-76f75df574-nw5qp" Dec 13 01:49:03.938854 kubelet[2533]: I1213 01:49:03.512527 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/e64acf22-94d3-4157-b902-e7cc7a167aa1-config-volume\") pod \"coredns-76f75df574-nw5qp\" (UID: \"e64acf22-94d3-4157-b902-e7cc7a167aa1\") " pod="kube-system/coredns-76f75df574-nw5qp" Dec 13 01:49:03.938854 kubelet[2533]: I1213 01:49:03.512574 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-l8l5s\" (UniqueName: \"kubernetes.io/projected/d4a264b9-878a-4af4-a4ad-8324686559fc-kube-api-access-l8l5s\") pod \"calico-apiserver-7887df9486-6z9mj\" (UID: \"d4a264b9-878a-4af4-a4ad-8324686559fc\") " pod="calico-apiserver/calico-apiserver-7887df9486-6z9mj" Dec 13 01:49:03.938854 kubelet[2533]: I1213 01:49:03.512609 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/4255679c-8178-4f78-b92e-656a9a754758-config-volume\") pod \"coredns-76f75df574-zhjgl\" (UID: \"4255679c-8178-4f78-b92e-656a9a754758\") " pod="kube-system/coredns-76f75df574-zhjgl" Dec 13 01:49:03.492675 systemd[1]: Created slice kubepods-burstable-pode64acf22_94d3_4157_b902_e7cc7a167aa1.slice. Dec 13 01:49:03.939183 kubelet[2533]: I1213 01:49:03.512660 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d4a264b9-878a-4af4-a4ad-8324686559fc-calico-apiserver-certs\") pod \"calico-apiserver-7887df9486-6z9mj\" (UID: \"d4a264b9-878a-4af4-a4ad-8324686559fc\") " pod="calico-apiserver/calico-apiserver-7887df9486-6z9mj" Dec 13 01:49:03.939183 kubelet[2533]: I1213 01:49:03.512691 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-v7c8t\" (UniqueName: \"kubernetes.io/projected/61883cf2-767f-4737-9b31-134e2368ecb8-kube-api-access-v7c8t\") pod \"calico-apiserver-7887df9486-hd7sh\" (UID: \"61883cf2-767f-4737-9b31-134e2368ecb8\") " pod="calico-apiserver/calico-apiserver-7887df9486-hd7sh" Dec 13 01:49:03.939183 kubelet[2533]: I1213 01:49:03.512744 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-qtzq4\" (UniqueName: \"kubernetes.io/projected/4255679c-8178-4f78-b92e-656a9a754758-kube-api-access-qtzq4\") pod \"coredns-76f75df574-zhjgl\" (UID: \"4255679c-8178-4f78-b92e-656a9a754758\") " pod="kube-system/coredns-76f75df574-zhjgl" Dec 13 01:49:03.939183 kubelet[2533]: I1213 01:49:03.512776 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/112d8bcc-2a50-44f8-a52e-cc27175b500a-tigera-ca-bundle\") pod \"calico-kube-controllers-6f89f797c7-8wmvk\" (UID: \"112d8bcc-2a50-44f8-a52e-cc27175b500a\") " pod="calico-system/calico-kube-controllers-6f89f797c7-8wmvk" Dec 13 01:49:03.939183 kubelet[2533]: I1213 01:49:03.512825 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xnb6t\" (UniqueName: \"kubernetes.io/projected/112d8bcc-2a50-44f8-a52e-cc27175b500a-kube-api-access-xnb6t\") pod \"calico-kube-controllers-6f89f797c7-8wmvk\" (UID: \"112d8bcc-2a50-44f8-a52e-cc27175b500a\") " pod="calico-system/calico-kube-controllers-6f89f797c7-8wmvk" Dec 13 01:49:03.500001 systemd[1]: Created slice kubepods-burstable-pod4255679c_8178_4f78_b92e_656a9a754758.slice. Dec 13 01:49:03.511845 systemd[1]: Created slice kubepods-besteffort-podd4a264b9_878a_4af4_a4ad_8324686559fc.slice. Dec 13 01:49:03.521594 systemd[1]: Created slice kubepods-besteffort-pod112d8bcc_2a50_44f8_a52e_cc27175b500a.slice. Dec 13 01:49:04.027690 systemd[1]: Created slice kubepods-besteffort-pod8063720a_786c_4bc8_8fad_0cb4ea957126.slice. Dec 13 01:49:04.030602 env[1410]: time="2024-12-13T01:49:04.030554091Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fnbwv,Uid:8063720a-786c-4bc8-8fad-0cb4ea957126,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:04.242039 env[1410]: time="2024-12-13T01:49:04.241575707Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7887df9486-hd7sh,Uid:61883cf2-767f-4737-9b31-134e2368ecb8,Namespace:calico-apiserver,Attempt:0,}" Dec 13 01:49:04.255644 env[1410]: time="2024-12-13T01:49:04.255594481Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7887df9486-6z9mj,Uid:d4a264b9-878a-4af4-a4ad-8324686559fc,Namespace:calico-apiserver,Attempt:0,}" Dec 13 01:49:04.256013 env[1410]: time="2024-12-13T01:49:04.255594881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f89f797c7-8wmvk,Uid:112d8bcc-2a50-44f8-a52e-cc27175b500a,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:04.615273 kubelet[2533]: E1213 01:49:04.615232 2533 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 13 01:49:04.615782 kubelet[2533]: E1213 01:49:04.615232 2533 configmap.go:199] Couldn't get configMap kube-system/coredns: failed to sync configmap cache: timed out waiting for the condition Dec 13 01:49:04.615782 kubelet[2533]: E1213 01:49:04.615396 2533 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/e64acf22-94d3-4157-b902-e7cc7a167aa1-config-volume podName:e64acf22-94d3-4157-b902-e7cc7a167aa1 nodeName:}" failed. No retries permitted until 2024-12-13 01:49:05.115363784 +0000 UTC m=+37.223478646 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/e64acf22-94d3-4157-b902-e7cc7a167aa1-config-volume") pod "coredns-76f75df574-nw5qp" (UID: "e64acf22-94d3-4157-b902-e7cc7a167aa1") : failed to sync configmap cache: timed out waiting for the condition Dec 13 01:49:04.616752 kubelet[2533]: E1213 01:49:04.616723 2533 nestedpendingoperations.go:348] Operation for "{volumeName:kubernetes.io/configmap/4255679c-8178-4f78-b92e-656a9a754758-config-volume podName:4255679c-8178-4f78-b92e-656a9a754758 nodeName:}" failed. No retries permitted until 2024-12-13 01:49:05.115407184 +0000 UTC m=+37.223522046 (durationBeforeRetry 500ms). Error: MountVolume.SetUp failed for volume "config-volume" (UniqueName: "kubernetes.io/configmap/4255679c-8178-4f78-b92e-656a9a754758-config-volume") pod "coredns-76f75df574-zhjgl" (UID: "4255679c-8178-4f78-b92e-656a9a754758") : failed to sync configmap cache: timed out waiting for the condition Dec 13 01:49:05.055514 env[1410]: time="2024-12-13T01:49:05.055453707Z" level=info msg="shim disconnected" id=3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8 Dec 13 01:49:05.055514 env[1410]: time="2024-12-13T01:49:05.055510207Z" level=warning msg="cleaning up after shim disconnected" id=3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8 namespace=k8s.io Dec 13 01:49:05.055514 env[1410]: time="2024-12-13T01:49:05.055521307Z" level=info msg="cleaning up dead shim" Dec 13 01:49:05.064746 env[1410]: time="2024-12-13T01:49:05.064704255Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:05Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3267 runtime=io.containerd.runc.v2\n" Dec 13 01:49:05.155940 env[1410]: time="2024-12-13T01:49:05.155889229Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-nw5qp,Uid:e64acf22-94d3-4157-b902-e7cc7a167aa1,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:05.156576 env[1410]: time="2024-12-13T01:49:05.156278531Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-zhjgl,Uid:4255679c-8178-4f78-b92e-656a9a754758,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:05.172477 env[1410]: time="2024-12-13T01:49:05.172218514Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 01:49:05.411597 env[1410]: time="2024-12-13T01:49:05.411145757Z" level=error msg="Failed to destroy network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.412249 env[1410]: time="2024-12-13T01:49:05.412204263Z" level=error msg="encountered an error cleaning up failed sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.412462 env[1410]: time="2024-12-13T01:49:05.412405464Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fnbwv,Uid:8063720a-786c-4bc8-8fad-0cb4ea957126,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.414978 kubelet[2533]: E1213 01:49:05.412889 2533 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.414978 kubelet[2533]: E1213 01:49:05.412975 2533 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fnbwv" Dec 13 01:49:05.414978 kubelet[2533]: E1213 01:49:05.413005 2533 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-fnbwv" Dec 13 01:49:05.415198 kubelet[2533]: E1213 01:49:05.413147 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-fnbwv_calico-system(8063720a-786c-4bc8-8fad-0cb4ea957126)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-fnbwv_calico-system(8063720a-786c-4bc8-8fad-0cb4ea957126)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:49:05.421068 env[1410]: time="2024-12-13T01:49:05.421022909Z" level=error msg="Failed to destroy network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.421357 env[1410]: time="2024-12-13T01:49:05.421317410Z" level=error msg="encountered an error cleaning up failed sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.421463 env[1410]: time="2024-12-13T01:49:05.421417411Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f89f797c7-8wmvk,Uid:112d8bcc-2a50-44f8-a52e-cc27175b500a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.421654 kubelet[2533]: E1213 01:49:05.421637 2533 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.421745 kubelet[2533]: E1213 01:49:05.421686 2533 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6f89f797c7-8wmvk" Dec 13 01:49:05.421745 kubelet[2533]: E1213 01:49:05.421716 2533 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-6f89f797c7-8wmvk" Dec 13 01:49:05.421841 kubelet[2533]: E1213 01:49:05.421780 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-6f89f797c7-8wmvk_calico-system(112d8bcc-2a50-44f8-a52e-cc27175b500a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-6f89f797c7-8wmvk_calico-system(112d8bcc-2a50-44f8-a52e-cc27175b500a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6f89f797c7-8wmvk" podUID="112d8bcc-2a50-44f8-a52e-cc27175b500a" Dec 13 01:49:05.436571 env[1410]: time="2024-12-13T01:49:05.436521489Z" level=error msg="Failed to destroy network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.437090 env[1410]: time="2024-12-13T01:49:05.437047092Z" level=error msg="encountered an error cleaning up failed sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.437296 env[1410]: time="2024-12-13T01:49:05.437230893Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7887df9486-hd7sh,Uid:61883cf2-767f-4737-9b31-134e2368ecb8,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.437671 kubelet[2533]: E1213 01:49:05.437646 2533 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.437777 kubelet[2533]: E1213 01:49:05.437704 2533 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7887df9486-hd7sh" Dec 13 01:49:05.437777 kubelet[2533]: E1213 01:49:05.437733 2533 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7887df9486-hd7sh" Dec 13 01:49:05.437869 kubelet[2533]: E1213 01:49:05.437800 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7887df9486-hd7sh_calico-apiserver(61883cf2-767f-4737-9b31-134e2368ecb8)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7887df9486-hd7sh_calico-apiserver(61883cf2-767f-4737-9b31-134e2368ecb8)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7887df9486-hd7sh" podUID="61883cf2-767f-4737-9b31-134e2368ecb8" Dec 13 01:49:05.467425 env[1410]: time="2024-12-13T01:49:05.467372250Z" level=error msg="Failed to destroy network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.467773 env[1410]: time="2024-12-13T01:49:05.467731952Z" level=error msg="encountered an error cleaning up failed sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.467870 env[1410]: time="2024-12-13T01:49:05.467793152Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7887df9486-6z9mj,Uid:d4a264b9-878a-4af4-a4ad-8324686559fc,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.468061 kubelet[2533]: E1213 01:49:05.468022 2533 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.468158 kubelet[2533]: E1213 01:49:05.468080 2533 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7887df9486-6z9mj" Dec 13 01:49:05.468158 kubelet[2533]: E1213 01:49:05.468117 2533 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-7887df9486-6z9mj" Dec 13 01:49:05.468248 kubelet[2533]: E1213 01:49:05.468185 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-7887df9486-6z9mj_calico-apiserver(d4a264b9-878a-4af4-a4ad-8324686559fc)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-7887df9486-6z9mj_calico-apiserver(d4a264b9-878a-4af4-a4ad-8324686559fc)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7887df9486-6z9mj" podUID="d4a264b9-878a-4af4-a4ad-8324686559fc" Dec 13 01:49:05.479406 env[1410]: time="2024-12-13T01:49:05.479355712Z" level=error msg="Failed to destroy network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.479941 env[1410]: time="2024-12-13T01:49:05.479892315Z" level=error msg="encountered an error cleaning up failed sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.480126 env[1410]: time="2024-12-13T01:49:05.480090716Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-zhjgl,Uid:4255679c-8178-4f78-b92e-656a9a754758,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.480677 kubelet[2533]: E1213 01:49:05.480436 2533 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.480677 kubelet[2533]: E1213 01:49:05.480524 2533 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-zhjgl" Dec 13 01:49:05.480677 kubelet[2533]: E1213 01:49:05.480562 2533 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-zhjgl" Dec 13 01:49:05.480919 kubelet[2533]: E1213 01:49:05.480652 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-zhjgl_kube-system(4255679c-8178-4f78-b92e-656a9a754758)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-zhjgl_kube-system(4255679c-8178-4f78-b92e-656a9a754758)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-zhjgl" podUID="4255679c-8178-4f78-b92e-656a9a754758" Dec 13 01:49:05.490356 env[1410]: time="2024-12-13T01:49:05.490313969Z" level=error msg="Failed to destroy network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.490694 env[1410]: time="2024-12-13T01:49:05.490652671Z" level=error msg="encountered an error cleaning up failed sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.490779 env[1410]: time="2024-12-13T01:49:05.490709471Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-nw5qp,Uid:e64acf22-94d3-4157-b902-e7cc7a167aa1,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.490976 kubelet[2533]: E1213 01:49:05.490957 2533 remote_runtime.go:193] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:05.491077 kubelet[2533]: E1213 01:49:05.491029 2533 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-nw5qp" Dec 13 01:49:05.491077 kubelet[2533]: E1213 01:49:05.491059 2533 kuberuntime_manager.go:1172] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-76f75df574-nw5qp" Dec 13 01:49:05.491171 kubelet[2533]: E1213 01:49:05.491129 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-76f75df574-nw5qp_kube-system(e64acf22-94d3-4157-b902-e7cc7a167aa1)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-76f75df574-nw5qp_kube-system(e64acf22-94d3-4157-b902-e7cc7a167aa1)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-nw5qp" podUID="e64acf22-94d3-4157-b902-e7cc7a167aa1" Dec 13 01:49:06.146800 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348-shm.mount: Deactivated successfully. Dec 13 01:49:06.146915 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef-shm.mount: Deactivated successfully. Dec 13 01:49:06.146993 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b-shm.mount: Deactivated successfully. Dec 13 01:49:06.167005 kubelet[2533]: I1213 01:49:06.166976 2533 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Dec 13 01:49:06.168084 env[1410]: time="2024-12-13T01:49:06.168041381Z" level=info msg="StopPodSandbox for \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\"" Dec 13 01:49:06.177700 kubelet[2533]: I1213 01:49:06.177670 2533 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Dec 13 01:49:06.178434 env[1410]: time="2024-12-13T01:49:06.178346634Z" level=info msg="StopPodSandbox for \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\"" Dec 13 01:49:06.181325 kubelet[2533]: I1213 01:49:06.181199 2533 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Dec 13 01:49:06.182395 env[1410]: time="2024-12-13T01:49:06.182338655Z" level=info msg="StopPodSandbox for \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\"" Dec 13 01:49:06.187957 kubelet[2533]: I1213 01:49:06.187317 2533 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Dec 13 01:49:06.189027 env[1410]: time="2024-12-13T01:49:06.188990889Z" level=info msg="StopPodSandbox for \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\"" Dec 13 01:49:06.190218 kubelet[2533]: I1213 01:49:06.189826 2533 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:06.191423 env[1410]: time="2024-12-13T01:49:06.191384901Z" level=info msg="StopPodSandbox for \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\"" Dec 13 01:49:06.200831 kubelet[2533]: I1213 01:49:06.200170 2533 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Dec 13 01:49:06.201748 env[1410]: time="2024-12-13T01:49:06.201710354Z" level=info msg="StopPodSandbox for \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\"" Dec 13 01:49:06.248621 env[1410]: time="2024-12-13T01:49:06.248546094Z" level=error msg="StopPodSandbox for \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\" failed" error="failed to destroy network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:06.248861 kubelet[2533]: E1213 01:49:06.248832 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Dec 13 01:49:06.248968 kubelet[2533]: E1213 01:49:06.248933 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689"} Dec 13 01:49:06.249017 kubelet[2533]: E1213 01:49:06.248982 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4255679c-8178-4f78-b92e-656a9a754758\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:06.249113 kubelet[2533]: E1213 01:49:06.249028 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4255679c-8178-4f78-b92e-656a9a754758\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-zhjgl" podUID="4255679c-8178-4f78-b92e-656a9a754758" Dec 13 01:49:06.299950 env[1410]: time="2024-12-13T01:49:06.299878256Z" level=error msg="StopPodSandbox for \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\" failed" error="failed to destroy network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:06.300276 env[1410]: time="2024-12-13T01:49:06.300145258Z" level=error msg="StopPodSandbox for \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\" failed" error="failed to destroy network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:06.300648 kubelet[2533]: E1213 01:49:06.300620 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Dec 13 01:49:06.300768 kubelet[2533]: E1213 01:49:06.300678 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f"} Dec 13 01:49:06.300768 kubelet[2533]: E1213 01:49:06.300725 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d4a264b9-878a-4af4-a4ad-8324686559fc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:06.300907 kubelet[2533]: E1213 01:49:06.300770 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d4a264b9-878a-4af4-a4ad-8324686559fc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7887df9486-6z9mj" podUID="d4a264b9-878a-4af4-a4ad-8324686559fc" Dec 13 01:49:06.300907 kubelet[2533]: E1213 01:49:06.300825 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:06.300907 kubelet[2533]: E1213 01:49:06.300844 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b"} Dec 13 01:49:06.300907 kubelet[2533]: E1213 01:49:06.300885 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"112d8bcc-2a50-44f8-a52e-cc27175b500a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:06.301147 kubelet[2533]: E1213 01:49:06.300915 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"112d8bcc-2a50-44f8-a52e-cc27175b500a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6f89f797c7-8wmvk" podUID="112d8bcc-2a50-44f8-a52e-cc27175b500a" Dec 13 01:49:06.317841 env[1410]: time="2024-12-13T01:49:06.317782248Z" level=error msg="StopPodSandbox for \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\" failed" error="failed to destroy network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:06.318243 kubelet[2533]: E1213 01:49:06.318214 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Dec 13 01:49:06.318353 kubelet[2533]: E1213 01:49:06.318263 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef"} Dec 13 01:49:06.318353 kubelet[2533]: E1213 01:49:06.318322 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8063720a-786c-4bc8-8fad-0cb4ea957126\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:06.318600 kubelet[2533]: E1213 01:49:06.318407 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8063720a-786c-4bc8-8fad-0cb4ea957126\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:49:06.325369 env[1410]: time="2024-12-13T01:49:06.325324487Z" level=error msg="StopPodSandbox for \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\" failed" error="failed to destroy network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:06.325597 kubelet[2533]: E1213 01:49:06.325567 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Dec 13 01:49:06.325697 kubelet[2533]: E1213 01:49:06.325608 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f"} Dec 13 01:49:06.325697 kubelet[2533]: E1213 01:49:06.325652 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e64acf22-94d3-4157-b902-e7cc7a167aa1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:06.325697 kubelet[2533]: E1213 01:49:06.325689 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e64acf22-94d3-4157-b902-e7cc7a167aa1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-nw5qp" podUID="e64acf22-94d3-4157-b902-e7cc7a167aa1" Dec 13 01:49:06.328275 env[1410]: time="2024-12-13T01:49:06.328230202Z" level=error msg="StopPodSandbox for \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\" failed" error="failed to destroy network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:06.328426 kubelet[2533]: E1213 01:49:06.328405 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Dec 13 01:49:06.328532 kubelet[2533]: E1213 01:49:06.328440 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348"} Dec 13 01:49:06.328532 kubelet[2533]: E1213 01:49:06.328507 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61883cf2-767f-4737-9b31-134e2368ecb8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:06.328657 kubelet[2533]: E1213 01:49:06.328545 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61883cf2-767f-4737-9b31-134e2368ecb8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7887df9486-hd7sh" podUID="61883cf2-767f-4737-9b31-134e2368ecb8" Dec 13 01:49:13.950155 kubelet[2533]: I1213 01:49:13.949925 2533 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:49:13.984000 audit[3599]: NETFILTER_CFG table=filter:101 family=2 entries=17 op=nft_register_rule pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:13.989862 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 01:49:13.989973 kernel: audit: type=1325 audit(1734054553.984:981): table=filter:101 family=2 entries=17 op=nft_register_rule pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:13.984000 audit[3599]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff41962450 a2=0 a3=7fff4196243c items=0 ppid=2710 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:14.021732 kernel: audit: type=1300 audit(1734054553.984:981): arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7fff41962450 a2=0 a3=7fff4196243c items=0 ppid=2710 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:13.984000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:14.031840 kernel: audit: type=1327 audit(1734054553.984:981): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:14.031955 kernel: audit: type=1325 audit(1734054554.021:982): table=nat:102 family=2 entries=19 op=nft_register_chain pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:14.021000 audit[3599]: NETFILTER_CFG table=nat:102 family=2 entries=19 op=nft_register_chain pid=3599 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:14.043657 kernel: audit: type=1300 audit(1734054554.021:982): arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff41962450 a2=0 a3=7fff4196243c items=0 ppid=2710 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:14.021000 audit[3599]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7fff41962450 a2=0 a3=7fff4196243c items=0 ppid=2710 pid=3599 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:14.021000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:14.063554 kernel: audit: type=1327 audit(1734054554.021:982): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:18.024186 env[1410]: time="2024-12-13T01:49:18.024135859Z" level=info msg="StopPodSandbox for \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\"" Dec 13 01:49:18.056038 env[1410]: time="2024-12-13T01:49:18.055975096Z" level=error msg="StopPodSandbox for \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\" failed" error="failed to destroy network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:18.056374 kubelet[2533]: E1213 01:49:18.056343 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Dec 13 01:49:18.056749 kubelet[2533]: E1213 01:49:18.056396 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348"} Dec 13 01:49:18.056749 kubelet[2533]: E1213 01:49:18.056457 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"61883cf2-767f-4737-9b31-134e2368ecb8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:18.056749 kubelet[2533]: E1213 01:49:18.056523 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"61883cf2-767f-4737-9b31-134e2368ecb8\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7887df9486-hd7sh" podUID="61883cf2-767f-4737-9b31-134e2368ecb8" Dec 13 01:49:19.023359 env[1410]: time="2024-12-13T01:49:19.023173056Z" level=info msg="StopPodSandbox for \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\"" Dec 13 01:49:19.048039 env[1410]: time="2024-12-13T01:49:19.047970661Z" level=error msg="StopPodSandbox for \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\" failed" error="failed to destroy network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:19.048633 kubelet[2533]: E1213 01:49:19.048604 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:19.048768 kubelet[2533]: E1213 01:49:19.048658 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b"} Dec 13 01:49:19.048768 kubelet[2533]: E1213 01:49:19.048707 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"112d8bcc-2a50-44f8-a52e-cc27175b500a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:19.048768 kubelet[2533]: E1213 01:49:19.048750 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"112d8bcc-2a50-44f8-a52e-cc27175b500a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-6f89f797c7-8wmvk" podUID="112d8bcc-2a50-44f8-a52e-cc27175b500a" Dec 13 01:49:20.026465 env[1410]: time="2024-12-13T01:49:20.026382516Z" level=info msg="StopPodSandbox for \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\"" Dec 13 01:49:20.028577 env[1410]: time="2024-12-13T01:49:20.028530125Z" level=info msg="StopPodSandbox for \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\"" Dec 13 01:49:20.099405 env[1410]: time="2024-12-13T01:49:20.099333521Z" level=error msg="StopPodSandbox for \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\" failed" error="failed to destroy network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:20.100410 kubelet[2533]: E1213 01:49:20.100173 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Dec 13 01:49:20.100410 kubelet[2533]: E1213 01:49:20.100231 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f"} Dec 13 01:49:20.100410 kubelet[2533]: E1213 01:49:20.100303 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"e64acf22-94d3-4157-b902-e7cc7a167aa1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:20.100410 kubelet[2533]: E1213 01:49:20.100358 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"e64acf22-94d3-4157-b902-e7cc7a167aa1\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-nw5qp" podUID="e64acf22-94d3-4157-b902-e7cc7a167aa1" Dec 13 01:49:20.103399 env[1410]: time="2024-12-13T01:49:20.103336338Z" level=error msg="StopPodSandbox for \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\" failed" error="failed to destroy network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:20.103931 kubelet[2533]: E1213 01:49:20.103752 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Dec 13 01:49:20.103931 kubelet[2533]: E1213 01:49:20.103804 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef"} Dec 13 01:49:20.103931 kubelet[2533]: E1213 01:49:20.103864 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"8063720a-786c-4bc8-8fad-0cb4ea957126\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:20.103931 kubelet[2533]: E1213 01:49:20.103899 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"8063720a-786c-4bc8-8fad-0cb4ea957126\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-fnbwv" podUID="8063720a-786c-4bc8-8fad-0cb4ea957126" Dec 13 01:49:21.024152 env[1410]: time="2024-12-13T01:49:21.023409196Z" level=info msg="StopPodSandbox for \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\"" Dec 13 01:49:21.057376 env[1410]: time="2024-12-13T01:49:21.057219636Z" level=error msg="StopPodSandbox for \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\" failed" error="failed to destroy network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:21.058542 kubelet[2533]: E1213 01:49:21.058294 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Dec 13 01:49:21.058542 kubelet[2533]: E1213 01:49:21.058377 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689"} Dec 13 01:49:21.058542 kubelet[2533]: E1213 01:49:21.058428 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"4255679c-8178-4f78-b92e-656a9a754758\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:21.058542 kubelet[2533]: E1213 01:49:21.058502 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"4255679c-8178-4f78-b92e-656a9a754758\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-76f75df574-zhjgl" podUID="4255679c-8178-4f78-b92e-656a9a754758" Dec 13 01:49:22.024737 env[1410]: time="2024-12-13T01:49:22.024683542Z" level=info msg="StopPodSandbox for \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\"" Dec 13 01:49:22.054355 env[1410]: time="2024-12-13T01:49:22.054288763Z" level=error msg="StopPodSandbox for \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\" failed" error="failed to destroy network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:22.054892 kubelet[2533]: E1213 01:49:22.054642 2533 remote_runtime.go:222] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Dec 13 01:49:22.054892 kubelet[2533]: E1213 01:49:22.054689 2533 kuberuntime_manager.go:1381] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f"} Dec 13 01:49:22.054892 kubelet[2533]: E1213 01:49:22.054732 2533 kuberuntime_manager.go:1081] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d4a264b9-878a-4af4-a4ad-8324686559fc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:22.054892 kubelet[2533]: E1213 01:49:22.054759 2533 pod_workers.go:1298] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d4a264b9-878a-4af4-a4ad-8324686559fc\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-7887df9486-6z9mj" podUID="d4a264b9-878a-4af4-a4ad-8324686559fc" Dec 13 01:49:23.636000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:23.636000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017fe8c0 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:49:23.654530 kernel: audit: type=1400 audit(1734054563.636:983): avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:23.654577 kernel: audit: type=1300 audit(1734054563.636:983): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017fe8c0 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:49:23.636000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:23.695455 kernel: audit: type=1327 audit(1734054563.636:983): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:23.676000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:23.676000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00111ee10 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:49:23.737676 kernel: audit: type=1400 audit(1734054563.676:984): avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:23.737834 kernel: audit: type=1300 audit(1734054563.676:984): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00111ee10 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:49:23.737870 kernel: audit: type=1327 audit(1734054563.676:984): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:23.676000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:24.407000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:24.407000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007787650 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:49:24.448030 kernel: audit: type=1400 audit(1734054564.407:985): avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=8309 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:24.448160 kernel: audit: type=1300 audit(1734054564.407:985): arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c007787650 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:49:24.448190 kernel: audit: type=1327 audit(1734054564.407:985): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:49:24.407000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:49:24.415000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:24.483435 kernel: audit: type=1400 audit(1734054564.415:986): avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:24.415000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0079cbee0 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:49:24.415000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:49:24.415000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=275 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:24.415000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0031950e0 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:49:24.415000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:49:24.416000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:24.416000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c003195320 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:49:24.416000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:49:24.463000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=271 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:24.463000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0077877d0 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:49:24.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:49:24.463000 audit[2356]: AVC avc: denied { watch } for pid=2356 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:24.463000 audit[2356]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=62 a1=c0079cbf00 a2=fc6 a3=0 items=0 ppid=2216 pid=2356 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c191,c539 key=(null) Dec 13 01:49:24.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E34002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B75626572 Dec 13 01:49:27.771000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:27.771000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017ff720 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:49:27.771000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:27.773000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:27.773000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017ff760 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:49:27.773000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:27.774000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:27.774000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001ad0200 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:49:27.774000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:27.775000 audit[2398]: AVC avc: denied { watch } for pid=2398 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=8307 scontext=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:27.775000 audit[2398]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0017ffc60 a2=fc6 a3=0 items=0 ppid=2270 pid=2398 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c496,c946 key=(null) Dec 13 01:49:27.775000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:28.475746 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount689734883.mount: Deactivated successfully. Dec 13 01:49:28.528094 env[1410]: time="2024-12-13T01:49:28.528035815Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:28.535441 env[1410]: time="2024-12-13T01:49:28.535388443Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:28.539552 env[1410]: time="2024-12-13T01:49:28.539513659Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:28.544649 env[1410]: time="2024-12-13T01:49:28.544611678Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:28.545044 env[1410]: time="2024-12-13T01:49:28.545009880Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 01:49:28.565352 env[1410]: time="2024-12-13T01:49:28.565307557Z" level=info msg="CreateContainer within sandbox \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 01:49:28.620019 env[1410]: time="2024-12-13T01:49:28.619961866Z" level=info msg="CreateContainer within sandbox \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\"" Dec 13 01:49:28.621861 env[1410]: time="2024-12-13T01:49:28.620778669Z" level=info msg="StartContainer for \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\"" Dec 13 01:49:28.642913 systemd[1]: Started cri-containerd-c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d.scope. Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.674649 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 01:49:28.674772 kernel: audit: type=1400 audit(1734054568.669:995): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fe0841f8108 items=0 ppid=2985 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.711816 kernel: audit: type=1300 audit(1734054568.669:995): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7fe0841f8108 items=0 ppid=2985 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335376231383565323137363665636132653336323439623338333431 Dec 13 01:49:28.734480 kernel: audit: type=1327 audit(1734054568.669:995): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335376231383565323137363665636132653336323439623338333431 Dec 13 01:49:28.745578 kernel: audit: type=1400 audit(1734054568.669:996): avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.749658 env[1410]: time="2024-12-13T01:49:28.749615162Z" level=info msg="StartContainer for \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\" returns successfully" Dec 13 01:49:28.762474 kernel: audit: type=1400 audit(1734054568.669:996): avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.762585 kernel: audit: type=1400 audit(1734054568.669:996): avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.790730 kernel: audit: type=1400 audit(1734054568.669:996): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.805500 kernel: audit: type=1400 audit(1734054568.669:996): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.832637 kernel: audit: type=1400 audit(1734054568.669:996): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.832735 kernel: audit: type=1400 audit(1734054568.669:996): avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit: BPF prog-id=140 op=LOAD Dec 13 01:49:28.669000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c0002cff98 items=0 ppid=2985 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335376231383565323137363665636132653336323439623338333431 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit: BPF prog-id=141 op=LOAD Dec 13 01:49:28.669000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c0002cffe8 items=0 ppid=2985 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335376231383565323137363665636132653336323439623338333431 Dec 13 01:49:28.669000 audit: BPF prog-id=141 op=UNLOAD Dec 13 01:49:28.669000 audit: BPF prog-id=140 op=UNLOAD Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { perfmon } for pid=3736 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit[3736]: AVC avc: denied { bpf } for pid=3736 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.669000 audit: BPF prog-id=142 op=LOAD Dec 13 01:49:28.669000 audit[3736]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00039e078 items=0 ppid=2985 pid=3736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.669000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6335376231383565323137363665636132653336323439623338333431 Dec 13 01:49:29.048377 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 01:49:29.048554 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 01:49:29.275237 kubelet[2533]: I1213 01:49:29.275192 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-node-l7vmv" podStartSLOduration=1.916818867 podStartE2EDuration="42.27513946s" podCreationTimestamp="2024-12-13 01:48:47 +0000 UTC" firstStartedPulling="2024-12-13 01:48:48.187023088 +0000 UTC m=+20.295137950" lastFinishedPulling="2024-12-13 01:49:28.545343581 +0000 UTC m=+60.653458543" observedRunningTime="2024-12-13 01:49:29.274853259 +0000 UTC m=+61.382968221" watchObservedRunningTime="2024-12-13 01:49:29.27513946 +0000 UTC m=+61.383254322" Dec 13 01:49:30.024542 env[1410]: time="2024-12-13T01:49:30.024494894Z" level=info msg="StopPodSandbox for \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\"" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.073 [INFO][3828] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.074 [INFO][3828] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" iface="eth0" netns="/var/run/netns/cni-ded1fbff-0e0d-a4a1-2e4e-bd1f2665ac89" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.074 [INFO][3828] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" iface="eth0" netns="/var/run/netns/cni-ded1fbff-0e0d-a4a1-2e4e-bd1f2665ac89" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.076 [INFO][3828] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" iface="eth0" netns="/var/run/netns/cni-ded1fbff-0e0d-a4a1-2e4e-bd1f2665ac89" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.076 [INFO][3828] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.076 [INFO][3828] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.095 [INFO][3834] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" HandleID="k8s-pod-network.9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.095 [INFO][3834] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.095 [INFO][3834] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.100 [WARNING][3834] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" HandleID="k8s-pod-network.9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.100 [INFO][3834] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" HandleID="k8s-pod-network.9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.101 [INFO][3834] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:30.104885 env[1410]: 2024-12-13 01:49:30.103 [INFO][3828] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348" Dec 13 01:49:30.111224 env[1410]: time="2024-12-13T01:49:30.108550408Z" level=info msg="TearDown network for sandbox \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\" successfully" Dec 13 01:49:30.111224 env[1410]: time="2024-12-13T01:49:30.108603009Z" level=info msg="StopPodSandbox for \"9145ac9c2a8433077cc725b0bbbb717806d684701ad031911532d2f236b50348\" returns successfully" Dec 13 01:49:30.111224 env[1410]: time="2024-12-13T01:49:30.109525312Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7887df9486-hd7sh,Uid:61883cf2-767f-4737-9b31-134e2368ecb8,Namespace:calico-apiserver,Attempt:1,}" Dec 13 01:49:30.110237 systemd[1]: run-netns-cni\x2dded1fbff\x2d0e0d\x2da4a1\x2d2e4e\x2dbd1f2665ac89.mount: Deactivated successfully. Dec 13 01:49:30.276721 systemd-networkd[1561]: calibadd6dc4339: Link UP Dec 13 01:49:30.289461 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:49:30.289609 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibadd6dc4339: link becomes ready Dec 13 01:49:30.292940 systemd-networkd[1561]: calibadd6dc4339: Gained carrier Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.179 [INFO][3842] cni-plugin/utils.go 100: File /var/lib/calico/mtu does not exist Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.189 [INFO][3842] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0 calico-apiserver-7887df9486- calico-apiserver 61883cf2-767f-4737-9b31-134e2368ecb8 825 0 2024-12-13 01:48:48 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7887df9486 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-04a43feb01 calico-apiserver-7887df9486-hd7sh eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calibadd6dc4339 [] []}} ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-hd7sh" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.190 [INFO][3842] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-hd7sh" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.213 [INFO][3854] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" HandleID="k8s-pod-network.677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.222 [INFO][3854] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" HandleID="k8s-pod-network.677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318af0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-04a43feb01", "pod":"calico-apiserver-7887df9486-hd7sh", "timestamp":"2024-12-13 01:49:30.213770402 +0000 UTC"}, Hostname:"ci-3510.3.6-a-04a43feb01", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.222 [INFO][3854] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.222 [INFO][3854] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.222 [INFO][3854] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-04a43feb01' Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.223 [INFO][3854] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.226 [INFO][3854] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.229 [INFO][3854] ipam/ipam.go 489: Trying affinity for 192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.231 [INFO][3854] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.233 [INFO][3854] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.233 [INFO][3854] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.64/26 handle="k8s-pod-network.677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.234 [INFO][3854] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363 Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.240 [INFO][3854] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.64/26 handle="k8s-pod-network.677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.245 [INFO][3854] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.65/26] block=192.168.81.64/26 handle="k8s-pod-network.677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.245 [INFO][3854] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.65/26] handle="k8s-pod-network.677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.245 [INFO][3854] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:30.315563 env[1410]: 2024-12-13 01:49:30.245 [INFO][3854] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.65/26] IPv6=[] ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" HandleID="k8s-pod-network.677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.316534 env[1410]: 2024-12-13 01:49:30.247 [INFO][3842] cni-plugin/k8s.go 386: Populated endpoint ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-hd7sh" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0", GenerateName:"calico-apiserver-7887df9486-", Namespace:"calico-apiserver", SelfLink:"", UID:"61883cf2-767f-4737-9b31-134e2368ecb8", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7887df9486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"", Pod:"calico-apiserver-7887df9486-hd7sh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.81.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibadd6dc4339", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:30.316534 env[1410]: 2024-12-13 01:49:30.247 [INFO][3842] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.65/32] ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-hd7sh" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.316534 env[1410]: 2024-12-13 01:49:30.247 [INFO][3842] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibadd6dc4339 ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-hd7sh" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.316534 env[1410]: 2024-12-13 01:49:30.293 [INFO][3842] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-hd7sh" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.316534 env[1410]: 2024-12-13 01:49:30.294 [INFO][3842] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-hd7sh" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0", GenerateName:"calico-apiserver-7887df9486-", Namespace:"calico-apiserver", SelfLink:"", UID:"61883cf2-767f-4737-9b31-134e2368ecb8", ResourceVersion:"825", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7887df9486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363", Pod:"calico-apiserver-7887df9486-hd7sh", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.81.65/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calibadd6dc4339", MAC:"5e:37:d8:1c:60:de", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:30.316534 env[1410]: 2024-12-13 01:49:30.313 [INFO][3842] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-hd7sh" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--hd7sh-eth0" Dec 13 01:49:30.339873 env[1410]: time="2024-12-13T01:49:30.339796874Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:30.339873 env[1410]: time="2024-12-13T01:49:30.339839274Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:30.340105 env[1410]: time="2024-12-13T01:49:30.339852974Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:30.340328 env[1410]: time="2024-12-13T01:49:30.340274076Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363 pid=3901 runtime=io.containerd.runc.v2 Dec 13 01:49:30.357476 systemd[1]: Started cri-containerd-677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363.scope. Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.392000 audit: BPF prog-id=143 op=LOAD Dec 13 01:49:30.393000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.393000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000199c48 a2=10 a3=1c items=0 ppid=3901 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.393000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373832383038306137376364363161386338646336663230643330 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001996b0 a2=3c a3=c items=0 ppid=3901 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373832383038306137376364363161386338646336663230643330 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.394000 audit: BPF prog-id=144 op=LOAD Dec 13 01:49:30.394000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001999d8 a2=78 a3=c00024ade0 items=0 ppid=3901 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.394000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373832383038306137376364363161386338646336663230643330 Dec 13 01:49:30.395000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.395000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.395000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.395000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.395000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.395000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.395000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.395000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.395000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.395000 audit: BPF prog-id=145 op=LOAD Dec 13 01:49:30.395000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000199770 a2=78 a3=c00024ae28 items=0 ppid=3901 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.395000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373832383038306137376364363161386338646336663230643330 Dec 13 01:49:30.396000 audit: BPF prog-id=145 op=UNLOAD Dec 13 01:49:30.396000 audit: BPF prog-id=144 op=UNLOAD Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { perfmon } for pid=3920 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit[3920]: AVC avc: denied { bpf } for pid=3920 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.397000 audit: BPF prog-id=146 op=LOAD Dec 13 01:49:30.397000 audit[3920]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000199c30 a2=78 a3=c00024b238 items=0 ppid=3901 pid=3920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.397000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3637373832383038306137376364363161386338646336663230643330 Dec 13 01:49:30.458751 env[1410]: time="2024-12-13T01:49:30.458606719Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7887df9486-hd7sh,Uid:61883cf2-767f-4737-9b31-134e2368ecb8,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363\"" Dec 13 01:49:30.461197 env[1410]: time="2024-12-13T01:49:30.461081428Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 01:49:30.466000 audit[3962]: AVC avc: denied { write } for pid=3962 comm="tee" name="fd" dev="proc" ino=31124 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:30.473975 systemd[1]: run-containerd-runc-k8s.io-c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d-runc.cYTz99.mount: Deactivated successfully. Dec 13 01:49:30.466000 audit[3962]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffded9d69fd a2=241 a3=1b6 items=1 ppid=3929 pid=3962 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.466000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 01:49:30.466000 audit: PATH item=0 name="/dev/fd/63" inode=31093 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:30.466000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:30.484000 audit[3986]: AVC avc: denied { write } for pid=3986 comm="tee" name="fd" dev="proc" ino=30633 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:30.484000 audit[3986]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffff2da2a0c a2=241 a3=1b6 items=1 ppid=3952 pid=3986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.484000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 01:49:30.484000 audit: PATH item=0 name="/dev/fd/63" inode=30623 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:30.484000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:30.503000 audit[4009]: AVC avc: denied { write } for pid=4009 comm="tee" name="fd" dev="proc" ino=31149 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:30.503000 audit[4009]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff4f8f6a0e a2=241 a3=1b6 items=1 ppid=3935 pid=4009 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.503000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 01:49:30.503000 audit: PATH item=0 name="/dev/fd/63" inode=31146 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:30.503000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:30.505000 audit[3995]: AVC avc: denied { write } for pid=3995 comm="tee" name="fd" dev="proc" ino=30652 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:30.505000 audit[3995]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fff1366ea0d a2=241 a3=1b6 items=1 ppid=3939 pid=3995 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.505000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 01:49:30.505000 audit: PATH item=0 name="/dev/fd/63" inode=30640 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:30.505000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:30.507000 audit[3996]: AVC avc: denied { write } for pid=3996 comm="tee" name="fd" dev="proc" ino=30654 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:30.507000 audit[3996]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd5486aa0c a2=241 a3=1b6 items=1 ppid=3937 pid=3996 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.507000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 01:49:30.507000 audit: PATH item=0 name="/dev/fd/63" inode=31138 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:30.507000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:30.523000 audit[4012]: AVC avc: denied { write } for pid=4012 comm="tee" name="fd" dev="proc" ino=30659 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:30.536000 audit[4006]: AVC avc: denied { write } for pid=4006 comm="tee" name="fd" dev="proc" ino=31154 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:30.536000 audit[4006]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffdbe8be9fc a2=241 a3=1b6 items=1 ppid=3957 pid=4006 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.536000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 01:49:30.536000 audit: PATH item=0 name="/dev/fd/63" inode=31145 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:30.536000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:30.523000 audit[4012]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7fffecbcea0c a2=241 a3=1b6 items=1 ppid=3954 pid=4012 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.523000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 01:49:30.523000 audit: PATH item=0 name="/dev/fd/63" inode=30649 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:30.523000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:30.730000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.730000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.730000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.730000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.730000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.730000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.730000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.730000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.730000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.730000 audit: BPF prog-id=147 op=LOAD Dec 13 01:49:30.730000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc6a5858f0 a2=98 a3=3 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.730000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.730000 audit: BPF prog-id=147 op=UNLOAD Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit: BPF prog-id=148 op=LOAD Dec 13 01:49:30.731000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc6a5856d0 a2=74 a3=540051 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.731000 audit: BPF prog-id=148 op=UNLOAD Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.731000 audit: BPF prog-id=149 op=LOAD Dec 13 01:49:30.731000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc6a585700 a2=94 a3=2 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.731000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.731000 audit: BPF prog-id=149 op=UNLOAD Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit: BPF prog-id=150 op=LOAD Dec 13 01:49:30.852000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc6a5855c0 a2=40 a3=1 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.852000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.852000 audit: BPF prog-id=150 op=UNLOAD Dec 13 01:49:30.852000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.852000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc6a585690 a2=50 a3=7ffc6a585770 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.852000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6a5855d0 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6a585600 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6a585510 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6a585620 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6a585600 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6a5855f0 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6a585620 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6a585600 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6a585620 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc6a5855f0 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc6a585660 a2=28 a3=0 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc6a585410 a2=50 a3=1 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit: BPF prog-id=151 op=LOAD Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc6a585410 a2=94 a3=5 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit: BPF prog-id=151 op=UNLOAD Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc6a5854c0 a2=50 a3=1 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc6a5855e0 a2=4 a3=38 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.862000 audit[4053]: AVC avc: denied { confidentiality } for pid=4053 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:30.862000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc6a585630 a2=94 a3=6 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.862000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { confidentiality } for pid=4053 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:30.863000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc6a584de0 a2=94 a3=83 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.863000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { bpf } for pid=4053 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: AVC avc: denied { perfmon } for pid=4053 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.863000 audit[4053]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc6a584de0 a2=94 a3=83 items=0 ppid=3960 pid=4053 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.863000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:30.871000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.871000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.871000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.871000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.871000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.871000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.871000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.871000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.871000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.871000 audit: BPF prog-id=152 op=LOAD Dec 13 01:49:30.871000 audit[4056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffddf229420 a2=98 a3=1999999999999999 items=0 ppid=3960 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.871000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:30.872000 audit: BPF prog-id=152 op=UNLOAD Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit: BPF prog-id=153 op=LOAD Dec 13 01:49:30.872000 audit[4056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffddf229300 a2=74 a3=ffff items=0 ppid=3960 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.872000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:30.872000 audit: BPF prog-id=153 op=UNLOAD Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { perfmon } for pid=4056 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit[4056]: AVC avc: denied { bpf } for pid=4056 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.872000 audit: BPF prog-id=154 op=LOAD Dec 13 01:49:30.872000 audit[4056]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffddf229340 a2=40 a3=7ffddf229520 items=0 ppid=3960 pid=4056 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.872000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:30.872000 audit: BPF prog-id=154 op=UNLOAD Dec 13 01:49:30.950885 systemd-networkd[1561]: vxlan.calico: Link UP Dec 13 01:49:30.950895 systemd-networkd[1561]: vxlan.calico: Gained carrier Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit: BPF prog-id=155 op=LOAD Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc125ebbd0 a2=98 a3=ffffffff items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.974000 audit: BPF prog-id=155 op=UNLOAD Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit: BPF prog-id=156 op=LOAD Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc125eb9e0 a2=74 a3=540051 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.974000 audit: BPF prog-id=156 op=UNLOAD Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit: BPF prog-id=157 op=LOAD Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc125eba10 a2=94 a3=2 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.974000 audit: BPF prog-id=157 op=UNLOAD Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc125eb8e0 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc125eb910 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc125eb820 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc125eb930 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc125eb910 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc125eb900 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.974000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.974000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc125eb930 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.974000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.975000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.975000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc125eb910 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.975000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc125eb930 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc125eb900 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7ffc125eb970 a2=28 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit: BPF prog-id=158 op=LOAD Dec 13 01:49:30.980000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc125eb7e0 a2=40 a3=0 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.980000 audit: BPF prog-id=158 op=UNLOAD Dec 13 01:49:30.980000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.980000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7ffc125eb7d0 a2=50 a3=2800 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.980000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7ffc125eb7d0 a2=50 a3=2800 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.981000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit: BPF prog-id=159 op=LOAD Dec 13 01:49:30.981000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc125eaff0 a2=94 a3=2 items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.981000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.981000 audit: BPF prog-id=159 op=UNLOAD Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { perfmon } for pid=4084 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit[4084]: AVC avc: denied { bpf } for pid=4084 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.981000 audit: BPF prog-id=160 op=LOAD Dec 13 01:49:30.981000 audit[4084]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc125eb0f0 a2=94 a3=2d items=0 ppid=3960 pid=4084 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.981000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit: BPF prog-id=161 op=LOAD Dec 13 01:49:30.984000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffde546efd0 a2=98 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.984000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:30.984000 audit: BPF prog-id=161 op=UNLOAD Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit: BPF prog-id=162 op=LOAD Dec 13 01:49:30.984000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffde546edb0 a2=74 a3=540051 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.984000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:30.984000 audit: BPF prog-id=162 op=UNLOAD Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:30.984000 audit: BPF prog-id=163 op=LOAD Dec 13 01:49:30.984000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffde546ede0 a2=94 a3=2 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:30.984000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:30.984000 audit: BPF prog-id=163 op=UNLOAD Dec 13 01:49:31.023718 env[1410]: time="2024-12-13T01:49:31.023184832Z" level=info msg="StopPodSandbox for \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\"" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.094 [INFO][4103] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.094 [INFO][4103] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" iface="eth0" netns="/var/run/netns/cni-5b29d6a7-6f85-b87b-f6fc-598515562b4d" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.094 [INFO][4103] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" iface="eth0" netns="/var/run/netns/cni-5b29d6a7-6f85-b87b-f6fc-598515562b4d" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.094 [INFO][4103] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" iface="eth0" netns="/var/run/netns/cni-5b29d6a7-6f85-b87b-f6fc-598515562b4d" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.094 [INFO][4103] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.094 [INFO][4103] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.129 [INFO][4110] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" HandleID="k8s-pod-network.19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Workload="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.129 [INFO][4110] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.130 [INFO][4110] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.139 [WARNING][4110] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" HandleID="k8s-pod-network.19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Workload="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.139 [INFO][4110] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" HandleID="k8s-pod-network.19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Workload="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.141 [INFO][4110] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:31.149499 env[1410]: 2024-12-13 01:49:31.142 [INFO][4103] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef" Dec 13 01:49:31.150675 env[1410]: time="2024-12-13T01:49:31.150628404Z" level=info msg="TearDown network for sandbox \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\" successfully" Dec 13 01:49:31.150809 env[1410]: time="2024-12-13T01:49:31.150789505Z" level=info msg="StopPodSandbox for \"19d2f3c86a6ae1a124f8646173dfec9aa1f65c3c6cc9b4b4fa6149bdb22249ef\" returns successfully" Dec 13 01:49:31.153641 env[1410]: time="2024-12-13T01:49:31.153606015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fnbwv,Uid:8063720a-786c-4bc8-8fad-0cb4ea957126,Namespace:calico-system,Attempt:1,}" Dec 13 01:49:31.157352 systemd[1]: run-netns-cni\x2d5b29d6a7\x2d6f85\x2db87b\x2df6fc\x2d598515562b4d.mount: Deactivated successfully. Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit: BPF prog-id=164 op=LOAD Dec 13 01:49:31.179000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffde546eca0 a2=40 a3=1 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.179000 audit: BPF prog-id=164 op=UNLOAD Dec 13 01:49:31.179000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.179000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffde546ed70 a2=50 a3=7ffde546ee50 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.179000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde546ecb0 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde546ece0 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde546ebf0 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde546ed00 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde546ece0 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde546ecd0 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde546ed00 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde546ece0 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde546ed00 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffde546ecd0 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffde546ed40 a2=28 a3=0 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffde546eaf0 a2=50 a3=1 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit: BPF prog-id=165 op=LOAD Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffde546eaf0 a2=94 a3=5 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit: BPF prog-id=165 op=UNLOAD Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffde546eba0 a2=50 a3=1 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffde546ecc0 a2=4 a3=38 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.189000 audit[4086]: AVC avc: denied { confidentiality } for pid=4086 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:31.189000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffde546ed10 a2=94 a3=6 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.189000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { confidentiality } for pid=4086 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:31.190000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffde546e4c0 a2=94 a3=83 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.190000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { perfmon } for pid=4086 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { confidentiality } for pid=4086 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:31.190000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffde546e4c0 a2=94 a3=83 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.190000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.190000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.190000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde546ff00 a2=10 a3=f1f00800 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.190000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.191000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.191000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde546fda0 a2=10 a3=3 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.191000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.191000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.191000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde546fd40 a2=10 a3=3 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.191000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.191000 audit[4086]: AVC avc: denied { bpf } for pid=4086 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.191000 audit[4086]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffde546fd40 a2=10 a3=7 items=0 ppid=3960 pid=4086 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.191000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:31.197000 audit: BPF prog-id=160 op=UNLOAD Dec 13 01:49:31.337202 systemd-networkd[1561]: cali1dd64c9b92c: Link UP Dec 13 01:49:31.343635 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali1dd64c9b92c: link becomes ready Dec 13 01:49:31.352898 systemd-networkd[1561]: cali1dd64c9b92c: Gained carrier Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.267 [INFO][4128] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0 csi-node-driver- calico-system 8063720a-786c-4bc8-8fad-0cb4ea957126 834 0 2024-12-13 01:48:47 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:55b695c467 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-04a43feb01 csi-node-driver-fnbwv eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] cali1dd64c9b92c [] []}} ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Namespace="calico-system" Pod="csi-node-driver-fnbwv" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.267 [INFO][4128] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Namespace="calico-system" Pod="csi-node-driver-fnbwv" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.294 [INFO][4142] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" HandleID="k8s-pod-network.764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Workload="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.307 [INFO][4142] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" HandleID="k8s-pod-network.764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Workload="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318fd0), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-04a43feb01", "pod":"csi-node-driver-fnbwv", "timestamp":"2024-12-13 01:49:31.294322937 +0000 UTC"}, Hostname:"ci-3510.3.6-a-04a43feb01", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.307 [INFO][4142] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.307 [INFO][4142] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.307 [INFO][4142] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-04a43feb01' Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.309 [INFO][4142] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.312 [INFO][4142] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.315 [INFO][4142] ipam/ipam.go 489: Trying affinity for 192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.316 [INFO][4142] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.318 [INFO][4142] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.318 [INFO][4142] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.64/26 handle="k8s-pod-network.764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.319 [INFO][4142] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4 Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.323 [INFO][4142] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.64/26 handle="k8s-pod-network.764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.330 [INFO][4142] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.66/26] block=192.168.81.64/26 handle="k8s-pod-network.764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.330 [INFO][4142] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.66/26] handle="k8s-pod-network.764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.330 [INFO][4142] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:31.362430 env[1410]: 2024-12-13 01:49:31.331 [INFO][4142] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.66/26] IPv6=[] ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" HandleID="k8s-pod-network.764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Workload="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.363438 env[1410]: 2024-12-13 01:49:31.332 [INFO][4128] cni-plugin/k8s.go 386: Populated endpoint ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Namespace="calico-system" Pod="csi-node-driver-fnbwv" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8063720a-786c-4bc8-8fad-0cb4ea957126", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"", Pod:"csi-node-driver-fnbwv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1dd64c9b92c", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:31.363438 env[1410]: 2024-12-13 01:49:31.332 [INFO][4128] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.66/32] ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Namespace="calico-system" Pod="csi-node-driver-fnbwv" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.363438 env[1410]: 2024-12-13 01:49:31.332 [INFO][4128] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali1dd64c9b92c ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Namespace="calico-system" Pod="csi-node-driver-fnbwv" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.363438 env[1410]: 2024-12-13 01:49:31.346 [INFO][4128] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Namespace="calico-system" Pod="csi-node-driver-fnbwv" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.363438 env[1410]: 2024-12-13 01:49:31.347 [INFO][4128] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Namespace="calico-system" Pod="csi-node-driver-fnbwv" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"8063720a-786c-4bc8-8fad-0cb4ea957126", ResourceVersion:"834", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"55b695c467", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4", Pod:"csi-node-driver-fnbwv", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.81.66/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"cali1dd64c9b92c", MAC:"8a:8b:2e:c9:25:8e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:31.363438 env[1410]: 2024-12-13 01:49:31.360 [INFO][4128] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4" Namespace="calico-system" Pod="csi-node-driver-fnbwv" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-csi--node--driver--fnbwv-eth0" Dec 13 01:49:31.392514 env[1410]: time="2024-12-13T01:49:31.391923399Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:31.392514 env[1410]: time="2024-12-13T01:49:31.391973199Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:31.392514 env[1410]: time="2024-12-13T01:49:31.391989599Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:31.392514 env[1410]: time="2024-12-13T01:49:31.392127599Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4 pid=4178 runtime=io.containerd.runc.v2 Dec 13 01:49:31.400000 audit[4170]: NETFILTER_CFG table=mangle:103 family=2 entries=16 op=nft_register_chain pid=4170 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:31.400000 audit[4170]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7ffe6c2eb1b0 a2=0 a3=7ffe6c2eb19c items=0 ppid=3960 pid=4170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.400000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:31.416000 audit[4171]: NETFILTER_CFG table=nat:104 family=2 entries=15 op=nft_register_chain pid=4171 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:31.416000 audit[4171]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffdd1de68b0 a2=0 a3=7ffdd1de689c items=0 ppid=3960 pid=4171 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.416000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:31.426910 systemd[1]: Started cri-containerd-764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4.scope. Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.439000 audit: BPF prog-id=166 op=LOAD Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000119c48 a2=10 a3=1c items=0 ppid=4178 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346464643435653064356538646564346263313933653462663236 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001196b0 a2=3c a3=c items=0 ppid=4178 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346464643435653064356538646564346263313933653462663236 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit: BPF prog-id=167 op=LOAD Dec 13 01:49:31.440000 audit[4195]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001199d8 a2=78 a3=c0002373e0 items=0 ppid=4178 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346464643435653064356538646564346263313933653462663236 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit: BPF prog-id=168 op=LOAD Dec 13 01:49:31.440000 audit[4195]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000119770 a2=78 a3=c000237428 items=0 ppid=4178 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346464643435653064356538646564346263313933653462663236 Dec 13 01:49:31.440000 audit: BPF prog-id=168 op=UNLOAD Dec 13 01:49:31.440000 audit: BPF prog-id=167 op=UNLOAD Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { perfmon } for pid=4195 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit[4195]: AVC avc: denied { bpf } for pid=4195 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.440000 audit: BPF prog-id=169 op=LOAD Dec 13 01:49:31.440000 audit[4195]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000119c30 a2=78 a3=c000237838 items=0 ppid=4178 pid=4195 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.440000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3736346464643435653064356538646564346263313933653462663236 Dec 13 01:49:31.451000 audit[4169]: NETFILTER_CFG table=raw:105 family=2 entries=21 op=nft_register_chain pid=4169 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:31.451000 audit[4169]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffc3db91dc0 a2=0 a3=7ffc3db91dac items=0 ppid=3960 pid=4169 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.451000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:31.456898 env[1410]: time="2024-12-13T01:49:31.456852339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-fnbwv,Uid:8063720a-786c-4bc8-8fad-0cb4ea957126,Namespace:calico-system,Attempt:1,} returns sandbox id \"764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4\"" Dec 13 01:49:31.469000 audit[4180]: NETFILTER_CFG table=filter:106 family=2 entries=75 op=nft_register_chain pid=4180 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:31.469000 audit[4180]: SYSCALL arch=c000003e syscall=46 success=yes exit=40748 a0=3 a1=7ffcd049adf0 a2=0 a3=7ffcd049addc items=0 ppid=3960 pid=4180 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.469000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:31.495000 audit[4225]: NETFILTER_CFG table=filter:107 family=2 entries=38 op=nft_register_chain pid=4225 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:31.495000 audit[4225]: SYSCALL arch=c000003e syscall=46 success=yes exit=20336 a0=3 a1=7ffee91358c0 a2=0 a3=7ffee91358ac items=0 ppid=3960 pid=4225 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.495000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:31.582650 systemd-networkd[1561]: calibadd6dc4339: Gained IPv6LL Dec 13 01:49:32.798742 systemd-networkd[1561]: vxlan.calico: Gained IPv6LL Dec 13 01:49:33.118651 systemd-networkd[1561]: cali1dd64c9b92c: Gained IPv6LL Dec 13 01:49:34.026903 env[1410]: time="2024-12-13T01:49:34.026856753Z" level=info msg="StopPodSandbox for \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\"" Dec 13 01:49:34.037062 env[1410]: time="2024-12-13T01:49:34.036941090Z" level=info msg="StopPodSandbox for \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\"" Dec 13 01:49:34.107399 env[1410]: time="2024-12-13T01:49:34.107290943Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:34.119270 env[1410]: time="2024-12-13T01:49:34.118578284Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:34.125745 env[1410]: time="2024-12-13T01:49:34.125585809Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:34.138431 env[1410]: time="2024-12-13T01:49:34.138383655Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:34.138859 env[1410]: time="2024-12-13T01:49:34.138822457Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 01:49:34.141104 env[1410]: time="2024-12-13T01:49:34.141072965Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 01:49:34.143702 env[1410]: time="2024-12-13T01:49:34.143650474Z" level=info msg="CreateContainer within sandbox \"677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.127 [INFO][4259] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.127 [INFO][4259] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" iface="eth0" netns="/var/run/netns/cni-2053c684-ecc4-8402-c11d-9ea6785b27b9" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.127 [INFO][4259] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" iface="eth0" netns="/var/run/netns/cni-2053c684-ecc4-8402-c11d-9ea6785b27b9" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.128 [INFO][4259] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" iface="eth0" netns="/var/run/netns/cni-2053c684-ecc4-8402-c11d-9ea6785b27b9" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.128 [INFO][4259] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.128 [INFO][4259] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.174 [INFO][4272] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" HandleID="k8s-pod-network.1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.174 [INFO][4272] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.174 [INFO][4272] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.186 [WARNING][4272] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" HandleID="k8s-pod-network.1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.187 [INFO][4272] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" HandleID="k8s-pod-network.1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.188 [INFO][4272] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:34.191537 env[1410]: 2024-12-13 01:49:34.189 [INFO][4259] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689" Dec 13 01:49:34.198225 env[1410]: time="2024-12-13T01:49:34.191735247Z" level=info msg="TearDown network for sandbox \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\" successfully" Dec 13 01:49:34.198225 env[1410]: time="2024-12-13T01:49:34.191775147Z" level=info msg="StopPodSandbox for \"1e2a8029045a8636b3b505967109f1957999a6f5bce6a76b56ef45b860023689\" returns successfully" Dec 13 01:49:34.198225 env[1410]: time="2024-12-13T01:49:34.197868469Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-zhjgl,Uid:4255679c-8178-4f78-b92e-656a9a754758,Namespace:kube-system,Attempt:1,}" Dec 13 01:49:34.193907 systemd[1]: run-netns-cni\x2d2053c684\x2decc4\x2d8402\x2dc11d\x2d9ea6785b27b9.mount: Deactivated successfully. Dec 13 01:49:34.203759 env[1410]: time="2024-12-13T01:49:34.203723290Z" level=info msg="CreateContainer within sandbox \"677828080a77cd61a8c8dc6f20d303e0e3dbea1bbc54b2f234793ff17e049363\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"493c5c68f72af549bcb4546d8139744e4b5d3ef3efad30a4ef41220e16b21132\"" Dec 13 01:49:34.205000 env[1410]: time="2024-12-13T01:49:34.204966695Z" level=info msg="StartContainer for \"493c5c68f72af549bcb4546d8139744e4b5d3ef3efad30a4ef41220e16b21132\"" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.110 [INFO][4248] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.110 [INFO][4248] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" iface="eth0" netns="/var/run/netns/cni-13edc00b-4145-4a69-9a9d-09d794bb8d45" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.110 [INFO][4248] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" iface="eth0" netns="/var/run/netns/cni-13edc00b-4145-4a69-9a9d-09d794bb8d45" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.111 [INFO][4248] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" iface="eth0" netns="/var/run/netns/cni-13edc00b-4145-4a69-9a9d-09d794bb8d45" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.111 [INFO][4248] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.111 [INFO][4248] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.181 [INFO][4268] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" HandleID="k8s-pod-network.92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.181 [INFO][4268] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.188 [INFO][4268] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.201 [WARNING][4268] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" HandleID="k8s-pod-network.92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.202 [INFO][4268] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" HandleID="k8s-pod-network.92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.206 [INFO][4268] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:34.210108 env[1410]: 2024-12-13 01:49:34.208 [INFO][4248] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:34.216973 env[1410]: time="2024-12-13T01:49:34.212541722Z" level=info msg="TearDown network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\" successfully" Dec 13 01:49:34.216973 env[1410]: time="2024-12-13T01:49:34.212585522Z" level=info msg="StopPodSandbox for \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\" returns successfully" Dec 13 01:49:34.215001 systemd[1]: run-netns-cni\x2d13edc00b\x2d4145\x2d4a69\x2d9a9d\x2d09d794bb8d45.mount: Deactivated successfully. Dec 13 01:49:34.217416 env[1410]: time="2024-12-13T01:49:34.217390339Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f89f797c7-8wmvk,Uid:112d8bcc-2a50-44f8-a52e-cc27175b500a,Namespace:calico-system,Attempt:1,}" Dec 13 01:49:34.240808 systemd[1]: Started cri-containerd-493c5c68f72af549bcb4546d8139744e4b5d3ef3efad30a4ef41220e16b21132.scope. Dec 13 01:49:34.275473 kernel: kauditd_printk_skb: 671 callbacks suppressed Dec 13 01:49:34.275591 kernel: audit: type=1400 audit(1734054574.270:1140): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304540 kernel: audit: type=1400 audit(1734054574.270:1141): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.321406 kernel: audit: type=1400 audit(1734054574.270:1142): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.338635 kernel: audit: type=1400 audit(1734054574.270:1143): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.367630 kernel: audit: type=1400 audit(1734054574.270:1144): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.367764 kernel: audit: type=1400 audit(1734054574.270:1145): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.396543 kernel: audit: type=1400 audit(1734054574.270:1146): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.396700 kernel: audit: type=1400 audit(1734054574.270:1147): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.270000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.270000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.413670 kernel: audit: type=1400 audit(1734054574.270:1148): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.288000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.289000 audit: BPF prog-id=170 op=LOAD Dec 13 01:49:34.429466 kernel: audit: type=1400 audit(1734054574.288:1149): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3901 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336335633638663732616635343962636234353436643831333937 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=3901 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336335633638663732616635343962636234353436643831333937 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.291000 audit: BPF prog-id=171 op=LOAD Dec 13 01:49:34.291000 audit[4291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000390580 items=0 ppid=3901 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.291000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336335633638663732616635343962636234353436643831333937 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit: BPF prog-id=172 op=LOAD Dec 13 01:49:34.304000 audit[4291]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003905c8 items=0 ppid=3901 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336335633638663732616635343962636234353436643831333937 Dec 13 01:49:34.304000 audit: BPF prog-id=172 op=UNLOAD Dec 13 01:49:34.304000 audit: BPF prog-id=171 op=UNLOAD Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { perfmon } for pid=4291 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit[4291]: AVC avc: denied { bpf } for pid=4291 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.304000 audit: BPF prog-id=173 op=LOAD Dec 13 01:49:34.304000 audit[4291]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003909d8 items=0 ppid=3901 pid=4291 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.304000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3439336335633638663732616635343962636234353436643831333937 Dec 13 01:49:34.445661 env[1410]: time="2024-12-13T01:49:34.445613961Z" level=info msg="StartContainer for \"493c5c68f72af549bcb4546d8139744e4b5d3ef3efad30a4ef41220e16b21132\" returns successfully" Dec 13 01:49:34.540099 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:49:34.540254 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calib017be094f1: link becomes ready Dec 13 01:49:34.540541 systemd-networkd[1561]: calib017be094f1: Link UP Dec 13 01:49:34.544958 systemd-networkd[1561]: calib017be094f1: Gained carrier Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.368 [INFO][4307] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0 coredns-76f75df574- kube-system 4255679c-8178-4f78-b92e-656a9a754758 846 0 2024-12-13 01:48:40 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-04a43feb01 coredns-76f75df574-zhjgl eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] calib017be094f1 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Namespace="kube-system" Pod="coredns-76f75df574-zhjgl" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.368 [INFO][4307] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Namespace="kube-system" Pod="coredns-76f75df574-zhjgl" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.463 [INFO][4318] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" HandleID="k8s-pod-network.c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.481 [INFO][4318] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" HandleID="k8s-pod-network.c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291950), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-04a43feb01", "pod":"coredns-76f75df574-zhjgl", "timestamp":"2024-12-13 01:49:34.463628026 +0000 UTC"}, Hostname:"ci-3510.3.6-a-04a43feb01", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.481 [INFO][4318] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.481 [INFO][4318] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.481 [INFO][4318] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-04a43feb01' Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.488 [INFO][4318] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.496 [INFO][4318] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.500 [INFO][4318] ipam/ipam.go 489: Trying affinity for 192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.502 [INFO][4318] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.505 [INFO][4318] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.505 [INFO][4318] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.64/26 handle="k8s-pod-network.c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.508 [INFO][4318] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4 Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.516 [INFO][4318] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.64/26 handle="k8s-pod-network.c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.522 [INFO][4318] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.67/26] block=192.168.81.64/26 handle="k8s-pod-network.c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.522 [INFO][4318] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.67/26] handle="k8s-pod-network.c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.522 [INFO][4318] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:34.566047 env[1410]: 2024-12-13 01:49:34.522 [INFO][4318] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.67/26] IPv6=[] ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" HandleID="k8s-pod-network.c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.567069 env[1410]: 2024-12-13 01:49:34.524 [INFO][4307] cni-plugin/k8s.go 386: Populated endpoint ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Namespace="kube-system" Pod="coredns-76f75df574-zhjgl" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4255679c-8178-4f78-b92e-656a9a754758", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"", Pod:"coredns-76f75df574-zhjgl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.81.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib017be094f1", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:34.567069 env[1410]: 2024-12-13 01:49:34.524 [INFO][4307] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.67/32] ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Namespace="kube-system" Pod="coredns-76f75df574-zhjgl" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.567069 env[1410]: 2024-12-13 01:49:34.524 [INFO][4307] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calib017be094f1 ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Namespace="kube-system" Pod="coredns-76f75df574-zhjgl" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.567069 env[1410]: 2024-12-13 01:49:34.549 [INFO][4307] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Namespace="kube-system" Pod="coredns-76f75df574-zhjgl" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.567069 env[1410]: 2024-12-13 01:49:34.550 [INFO][4307] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Namespace="kube-system" Pod="coredns-76f75df574-zhjgl" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"4255679c-8178-4f78-b92e-656a9a754758", ResourceVersion:"846", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4", Pod:"coredns-76f75df574-zhjgl", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.81.67/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"calib017be094f1", MAC:"6e:eb:fd:43:ea:b4", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:34.567069 env[1410]: 2024-12-13 01:49:34.564 [INFO][4307] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4" Namespace="kube-system" Pod="coredns-76f75df574-zhjgl" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--zhjgl-eth0" Dec 13 01:49:34.617000 audit[4367]: NETFILTER_CFG table=filter:108 family=2 entries=48 op=nft_register_chain pid=4367 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:34.617000 audit[4367]: SYSCALL arch=c000003e syscall=46 success=yes exit=24376 a0=3 a1=7ffd112b2040 a2=0 a3=7ffd112b202c items=0 ppid=3960 pid=4367 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.617000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:34.637559 env[1410]: time="2024-12-13T01:49:34.637481952Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:34.637816 env[1410]: time="2024-12-13T01:49:34.637773053Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:34.637957 env[1410]: time="2024-12-13T01:49:34.637930354Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:34.638248 env[1410]: time="2024-12-13T01:49:34.638215955Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4 pid=4376 runtime=io.containerd.runc.v2 Dec 13 01:49:34.668314 systemd[1]: Started cri-containerd-c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4.scope. Dec 13 01:49:34.691276 systemd-networkd[1561]: cali5d7b4f94bab: Link UP Dec 13 01:49:34.698630 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali5d7b4f94bab: link becomes ready Dec 13 01:49:34.698323 systemd-networkd[1561]: cali5d7b4f94bab: Gained carrier Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.494 [INFO][4319] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0 calico-kube-controllers-6f89f797c7- calico-system 112d8bcc-2a50-44f8-a52e-cc27175b500a 845 0 2024-12-13 01:48:47 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:6f89f797c7 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-04a43feb01 calico-kube-controllers-6f89f797c7-8wmvk eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] cali5d7b4f94bab [] []}} ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Namespace="calico-system" Pod="calico-kube-controllers-6f89f797c7-8wmvk" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.495 [INFO][4319] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Namespace="calico-system" Pod="calico-kube-controllers-6f89f797c7-8wmvk" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.597 [INFO][4343] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" HandleID="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.609 [INFO][4343] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" HandleID="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000051f40), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-04a43feb01", "pod":"calico-kube-controllers-6f89f797c7-8wmvk", "timestamp":"2024-12-13 01:49:34.597266407 +0000 UTC"}, Hostname:"ci-3510.3.6-a-04a43feb01", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.609 [INFO][4343] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.609 [INFO][4343] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.610 [INFO][4343] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-04a43feb01' Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.624 [INFO][4343] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.632 [INFO][4343] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.639 [INFO][4343] ipam/ipam.go 489: Trying affinity for 192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.642 [INFO][4343] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.646 [INFO][4343] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.646 [INFO][4343] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.64/26 handle="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.650 [INFO][4343] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837 Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.660 [INFO][4343] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.64/26 handle="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.673 [INFO][4343] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.68/26] block=192.168.81.64/26 handle="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.673 [INFO][4343] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.68/26] handle="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.673 [INFO][4343] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:34.713828 env[1410]: 2024-12-13 01:49:34.673 [INFO][4343] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.68/26] IPv6=[] ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" HandleID="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.714874 env[1410]: 2024-12-13 01:49:34.676 [INFO][4319] cni-plugin/k8s.go 386: Populated endpoint ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Namespace="calico-system" Pod="calico-kube-controllers-6f89f797c7-8wmvk" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0", GenerateName:"calico-kube-controllers-6f89f797c7-", Namespace:"calico-system", SelfLink:"", UID:"112d8bcc-2a50-44f8-a52e-cc27175b500a", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f89f797c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"", Pod:"calico-kube-controllers-6f89f797c7-8wmvk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.81.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d7b4f94bab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:34.714874 env[1410]: 2024-12-13 01:49:34.676 [INFO][4319] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.68/32] ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Namespace="calico-system" Pod="calico-kube-controllers-6f89f797c7-8wmvk" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.714874 env[1410]: 2024-12-13 01:49:34.676 [INFO][4319] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali5d7b4f94bab ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Namespace="calico-system" Pod="calico-kube-controllers-6f89f797c7-8wmvk" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.714874 env[1410]: 2024-12-13 01:49:34.698 [INFO][4319] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Namespace="calico-system" Pod="calico-kube-controllers-6f89f797c7-8wmvk" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.714874 env[1410]: 2024-12-13 01:49:34.698 [INFO][4319] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Namespace="calico-system" Pod="calico-kube-controllers-6f89f797c7-8wmvk" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0", GenerateName:"calico-kube-controllers-6f89f797c7-", Namespace:"calico-system", SelfLink:"", UID:"112d8bcc-2a50-44f8-a52e-cc27175b500a", ResourceVersion:"845", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f89f797c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837", Pod:"calico-kube-controllers-6f89f797c7-8wmvk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.81.68/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d7b4f94bab", MAC:"86:d0:ae:d9:15:df", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:34.714874 env[1410]: 2024-12-13 01:49:34.712 [INFO][4319] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Namespace="calico-system" Pod="calico-kube-controllers-6f89f797c7-8wmvk" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.723000 audit: BPF prog-id=174 op=LOAD Dec 13 01:49:34.724000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.724000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4376 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383164633232393463646162383835613461326164303135393130 Dec 13 01:49:34.724000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.724000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4376 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.724000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383164633232393463646162383835613461326164303135393130 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit: BPF prog-id=175 op=LOAD Dec 13 01:49:34.725000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c41f0 items=0 ppid=4376 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383164633232393463646162383835613461326164303135393130 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.725000 audit: BPF prog-id=176 op=LOAD Dec 13 01:49:34.725000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c4238 items=0 ppid=4376 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383164633232393463646162383835613461326164303135393130 Dec 13 01:49:34.725000 audit: BPF prog-id=176 op=UNLOAD Dec 13 01:49:34.725000 audit: BPF prog-id=175 op=UNLOAD Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { perfmon } for pid=4386 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit[4386]: AVC avc: denied { bpf } for pid=4386 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.726000 audit: BPF prog-id=177 op=LOAD Dec 13 01:49:34.726000 audit[4386]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c4648 items=0 ppid=4376 pid=4386 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6333383164633232393463646162383835613461326164303135393130 Dec 13 01:49:34.747479 env[1410]: time="2024-12-13T01:49:34.745193440Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:34.747479 env[1410]: time="2024-12-13T01:49:34.745267040Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:34.747479 env[1410]: time="2024-12-13T01:49:34.745294040Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:34.747479 env[1410]: time="2024-12-13T01:49:34.745432741Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837 pid=4422 runtime=io.containerd.runc.v2 Dec 13 01:49:34.775187 systemd[1]: Started cri-containerd-1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837.scope. Dec 13 01:49:34.782097 env[1410]: time="2024-12-13T01:49:34.782050072Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-zhjgl,Uid:4255679c-8178-4f78-b92e-656a9a754758,Namespace:kube-system,Attempt:1,} returns sandbox id \"c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4\"" Dec 13 01:49:34.787001 env[1410]: time="2024-12-13T01:49:34.786960190Z" level=info msg="CreateContainer within sandbox \"c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 01:49:34.801000 audit[4450]: NETFILTER_CFG table=filter:109 family=2 entries=38 op=nft_register_chain pid=4450 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:34.801000 audit[4450]: SYSCALL arch=c000003e syscall=46 success=yes exit=19812 a0=3 a1=7ffe965a3b50 a2=0 a3=7ffe965a3b3c items=0 ppid=3960 pid=4450 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.801000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.813000 audit: BPF prog-id=178 op=LOAD Dec 13 01:49:34.814000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.814000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=4422 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.814000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165626265386332396639666365333234656333336562626365316366 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=c items=0 ppid=4422 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165626265386332396639666365333234656333336562626365316366 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.815000 audit: BPF prog-id=179 op=LOAD Dec 13 01:49:34.815000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c00034bce0 items=0 ppid=4422 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.815000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165626265386332396639666365333234656333336562626365316366 Dec 13 01:49:34.821000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.821000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.821000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.821000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.821000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.821000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.821000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.821000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.821000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.821000 audit: BPF prog-id=180 op=LOAD Dec 13 01:49:34.821000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c00034bd28 items=0 ppid=4422 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.821000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165626265386332396639666365333234656333336562626365316366 Dec 13 01:49:34.822000 audit: BPF prog-id=180 op=UNLOAD Dec 13 01:49:34.822000 audit: BPF prog-id=179 op=UNLOAD Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { perfmon } for pid=4432 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit[4432]: AVC avc: denied { bpf } for pid=4432 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.822000 audit: BPF prog-id=181 op=LOAD Dec 13 01:49:34.822000 audit[4432]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0003ce138 items=0 ppid=4422 pid=4432 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.822000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3165626265386332396639666365333234656333336562626365316366 Dec 13 01:49:34.861455 env[1410]: time="2024-12-13T01:49:34.861400758Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-6f89f797c7-8wmvk,Uid:112d8bcc-2a50-44f8-a52e-cc27175b500a,Namespace:calico-system,Attempt:1,} returns sandbox id \"1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837\"" Dec 13 01:49:34.871847 env[1410]: time="2024-12-13T01:49:34.871799096Z" level=info msg="CreateContainer within sandbox \"c381dc2294cdab885a4a2ad01591035c39c7e8b1138b2babccb9f83916e305d4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"b4b78a8bf1d64d0d18e9013ce1330cf77d7619dddfa5ddccff6a2a0934cdfa73\"" Dec 13 01:49:34.872638 env[1410]: time="2024-12-13T01:49:34.872605198Z" level=info msg="StartContainer for \"b4b78a8bf1d64d0d18e9013ce1330cf77d7619dddfa5ddccff6a2a0934cdfa73\"" Dec 13 01:49:34.892530 systemd[1]: Started cri-containerd-b4b78a8bf1d64d0d18e9013ce1330cf77d7619dddfa5ddccff6a2a0934cdfa73.scope. Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.911000 audit: BPF prog-id=182 op=LOAD Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000117c48 a2=10 a3=1c items=0 ppid=4376 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623738613862663164363464306431386539303133636531333330 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001176b0 a2=3c a3=8 items=0 ppid=4376 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623738613862663164363464306431386539303133636531333330 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit: BPF prog-id=183 op=LOAD Dec 13 01:49:34.912000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001179d8 a2=78 a3=c000349d20 items=0 ppid=4376 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623738613862663164363464306431386539303133636531333330 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.912000 audit: BPF prog-id=184 op=LOAD Dec 13 01:49:34.912000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000117770 a2=78 a3=c000349d68 items=0 ppid=4376 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.912000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623738613862663164363464306431386539303133636531333330 Dec 13 01:49:34.913000 audit: BPF prog-id=184 op=UNLOAD Dec 13 01:49:34.913000 audit: BPF prog-id=183 op=UNLOAD Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { perfmon } for pid=4469 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit[4469]: AVC avc: denied { bpf } for pid=4469 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:34.913000 audit: BPF prog-id=185 op=LOAD Dec 13 01:49:34.913000 audit[4469]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000117c30 a2=78 a3=c00039e178 items=0 ppid=4376 pid=4469 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.913000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6234623738613862663164363464306431386539303133636531333330 Dec 13 01:49:34.938872 env[1410]: time="2024-12-13T01:49:34.938814237Z" level=info msg="StartContainer for \"b4b78a8bf1d64d0d18e9013ce1330cf77d7619dddfa5ddccff6a2a0934cdfa73\" returns successfully" Dec 13 01:49:35.189589 systemd[1]: run-containerd-runc-k8s.io-493c5c68f72af549bcb4546d8139744e4b5d3ef3efad30a4ef41220e16b21132-runc.DPeNzG.mount: Deactivated successfully. Dec 13 01:49:35.314720 kubelet[2533]: I1213 01:49:35.314678 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7887df9486-hd7sh" podStartSLOduration=43.636044748 podStartE2EDuration="47.314616079s" podCreationTimestamp="2024-12-13 01:48:48 +0000 UTC" firstStartedPulling="2024-12-13 01:49:30.460741227 +0000 UTC m=+62.568856089" lastFinishedPulling="2024-12-13 01:49:34.139312458 +0000 UTC m=+66.247427420" observedRunningTime="2024-12-13 01:49:35.285149074 +0000 UTC m=+67.393263936" watchObservedRunningTime="2024-12-13 01:49:35.314616079 +0000 UTC m=+67.422730941" Dec 13 01:49:35.317257 kubelet[2533]: I1213 01:49:35.317225 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-zhjgl" podStartSLOduration=55.317174889 podStartE2EDuration="55.317174889s" podCreationTimestamp="2024-12-13 01:48:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:35.313939277 +0000 UTC m=+67.422054139" watchObservedRunningTime="2024-12-13 01:49:35.317174889 +0000 UTC m=+67.425289851" Dec 13 01:49:35.320000 audit[4500]: NETFILTER_CFG table=filter:110 family=2 entries=16 op=nft_register_rule pid=4500 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:35.320000 audit[4500]: SYSCALL arch=c000003e syscall=46 success=yes exit=5908 a0=3 a1=7ffe3c51c0f0 a2=0 a3=7ffe3c51c0dc items=0 ppid=2710 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.320000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:35.330000 audit[4500]: NETFILTER_CFG table=nat:111 family=2 entries=14 op=nft_register_rule pid=4500 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:35.330000 audit[4500]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffe3c51c0f0 a2=0 a3=0 items=0 ppid=2710 pid=4500 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.330000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:35.348000 audit[4502]: NETFILTER_CFG table=filter:112 family=2 entries=13 op=nft_register_rule pid=4502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:35.348000 audit[4502]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffc33578ea0 a2=0 a3=7ffc33578e8c items=0 ppid=2710 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.348000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:35.354000 audit[4502]: NETFILTER_CFG table=nat:113 family=2 entries=35 op=nft_register_chain pid=4502 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:35.354000 audit[4502]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7ffc33578ea0 a2=0 a3=7ffc33578e8c items=0 ppid=2710 pid=4502 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.354000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:35.605000 audit[4301]: AVC avc: denied { watch } for pid=4301 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_03.2904537137/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c279,c834 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c279,c834 tclass=file permissive=0 Dec 13 01:49:35.605000 audit[4301]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00056bc60 a2=fc6 a3=0 items=0 ppid=3901 pid=4301 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c279,c834 key=(null) Dec 13 01:49:35.605000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:49:35.615596 systemd-networkd[1561]: calib017be094f1: Gained IPv6LL Dec 13 01:49:35.841854 env[1410]: time="2024-12-13T01:49:35.841797260Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:35.851953 env[1410]: time="2024-12-13T01:49:35.851902796Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:35.862678 env[1410]: time="2024-12-13T01:49:35.862243933Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:35.870415 env[1410]: time="2024-12-13T01:49:35.870371462Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:35.870731 env[1410]: time="2024-12-13T01:49:35.870695263Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 01:49:35.872816 env[1410]: time="2024-12-13T01:49:35.872774970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 01:49:35.874474 env[1410]: time="2024-12-13T01:49:35.873695874Z" level=info msg="CreateContainer within sandbox \"764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 01:49:35.937847 env[1410]: time="2024-12-13T01:49:35.937791602Z" level=info msg="CreateContainer within sandbox \"764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"f52f6ee24ebf2005cd19903a0a082fe9aa7dbc2bb2122a2d53a7d9cb0adbfa81\"" Dec 13 01:49:35.939934 env[1410]: time="2024-12-13T01:49:35.938811506Z" level=info msg="StartContainer for \"f52f6ee24ebf2005cd19903a0a082fe9aa7dbc2bb2122a2d53a7d9cb0adbfa81\"" Dec 13 01:49:35.969711 systemd[1]: run-containerd-runc-k8s.io-f52f6ee24ebf2005cd19903a0a082fe9aa7dbc2bb2122a2d53a7d9cb0adbfa81-runc.KQViPl.mount: Deactivated successfully. Dec 13 01:49:35.974019 systemd[1]: Started cri-containerd-f52f6ee24ebf2005cd19903a0a082fe9aa7dbc2bb2122a2d53a7d9cb0adbfa81.scope. Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c00011f6b0 a2=3c a3=7f638c155a88 items=0 ppid=4178 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635326636656532346562663230303563643139393033613061303832 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit: BPF prog-id=186 op=LOAD Dec 13 01:49:35.987000 audit[4511]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011f9d8 a2=78 a3=c0001e65e8 items=0 ppid=4178 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635326636656532346562663230303563643139393033613061303832 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit: BPF prog-id=187 op=LOAD Dec 13 01:49:35.987000 audit[4511]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c00011f770 a2=78 a3=c0001e6638 items=0 ppid=4178 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635326636656532346562663230303563643139393033613061303832 Dec 13 01:49:35.987000 audit: BPF prog-id=187 op=UNLOAD Dec 13 01:49:35.987000 audit: BPF prog-id=186 op=UNLOAD Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.987000 audit: BPF prog-id=188 op=LOAD Dec 13 01:49:35.987000 audit[4511]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c00011fc30 a2=78 a3=c0001e66c8 items=0 ppid=4178 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.987000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6635326636656532346562663230303563643139393033613061303832 Dec 13 01:49:36.006202 env[1410]: time="2024-12-13T01:49:36.006160246Z" level=info msg="StartContainer for \"f52f6ee24ebf2005cd19903a0a082fe9aa7dbc2bb2122a2d53a7d9cb0adbfa81\" returns successfully" Dec 13 01:49:36.023374 env[1410]: time="2024-12-13T01:49:36.023329407Z" level=info msg="StopPodSandbox for \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\"" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.080 [INFO][4551] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.080 [INFO][4551] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" iface="eth0" netns="/var/run/netns/cni-c224c9ea-4761-dc85-1c2b-2dd0edff9a20" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.081 [INFO][4551] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" iface="eth0" netns="/var/run/netns/cni-c224c9ea-4761-dc85-1c2b-2dd0edff9a20" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.081 [INFO][4551] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" iface="eth0" netns="/var/run/netns/cni-c224c9ea-4761-dc85-1c2b-2dd0edff9a20" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.081 [INFO][4551] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.081 [INFO][4551] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.107 [INFO][4557] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" HandleID="k8s-pod-network.e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.107 [INFO][4557] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.107 [INFO][4557] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.112 [WARNING][4557] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" HandleID="k8s-pod-network.e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.112 [INFO][4557] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" HandleID="k8s-pod-network.e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.113 [INFO][4557] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:36.116094 env[1410]: 2024-12-13 01:49:36.114 [INFO][4551] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f" Dec 13 01:49:36.118101 env[1410]: time="2024-12-13T01:49:36.118043942Z" level=info msg="TearDown network for sandbox \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\" successfully" Dec 13 01:49:36.118222 env[1410]: time="2024-12-13T01:49:36.118103642Z" level=info msg="StopPodSandbox for \"e6c181b853bc6072b71966d91522d8d4dba74057f77a8d16e1d4469c638d0b9f\" returns successfully" Dec 13 01:49:36.118999 env[1410]: time="2024-12-13T01:49:36.118966945Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-nw5qp,Uid:e64acf22-94d3-4157-b902-e7cc7a167aa1,Namespace:kube-system,Attempt:1,}" Dec 13 01:49:36.181640 systemd[1]: run-netns-cni\x2dc224c9ea\x2d4761\x2ddc85\x2d1c2b\x2d2dd0edff9a20.mount: Deactivated successfully. Dec 13 01:49:36.323850 systemd-networkd[1561]: cali807fb92ee44: Link UP Dec 13 01:49:36.338374 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:49:36.338582 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali807fb92ee44: link becomes ready Dec 13 01:49:36.340953 systemd-networkd[1561]: cali807fb92ee44: Gained carrier Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.245 [INFO][4564] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0 coredns-76f75df574- kube-system e64acf22-94d3-4157-b902-e7cc7a167aa1 885 0 2024-12-13 01:48:40 +0000 UTC map[k8s-app:kube-dns pod-template-hash:76f75df574 projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-04a43feb01 coredns-76f75df574-nw5qp eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali807fb92ee44 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Namespace="kube-system" Pod="coredns-76f75df574-nw5qp" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.245 [INFO][4564] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Namespace="kube-system" Pod="coredns-76f75df574-nw5qp" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.277 [INFO][4575] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" HandleID="k8s-pod-network.09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.285 [INFO][4575] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" HandleID="k8s-pod-network.09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000050120), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-04a43feb01", "pod":"coredns-76f75df574-nw5qp", "timestamp":"2024-12-13 01:49:36.276993804 +0000 UTC"}, Hostname:"ci-3510.3.6-a-04a43feb01", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.285 [INFO][4575] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.285 [INFO][4575] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.285 [INFO][4575] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-04a43feb01' Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.287 [INFO][4575] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.292 [INFO][4575] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.295 [INFO][4575] ipam/ipam.go 489: Trying affinity for 192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.297 [INFO][4575] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.299 [INFO][4575] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.299 [INFO][4575] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.64/26 handle="k8s-pod-network.09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.300 [INFO][4575] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.308 [INFO][4575] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.64/26 handle="k8s-pod-network.09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.317 [INFO][4575] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.69/26] block=192.168.81.64/26 handle="k8s-pod-network.09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.317 [INFO][4575] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.69/26] handle="k8s-pod-network.09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.317 [INFO][4575] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:36.357108 env[1410]: 2024-12-13 01:49:36.317 [INFO][4575] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.69/26] IPv6=[] ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" HandleID="k8s-pod-network.09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Workload="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.358174 env[1410]: 2024-12-13 01:49:36.319 [INFO][4564] cni-plugin/k8s.go 386: Populated endpoint ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Namespace="kube-system" Pod="coredns-76f75df574-nw5qp" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e64acf22-94d3-4157-b902-e7cc7a167aa1", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"", Pod:"coredns-76f75df574-nw5qp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.81.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali807fb92ee44", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:36.358174 env[1410]: 2024-12-13 01:49:36.319 [INFO][4564] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.69/32] ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Namespace="kube-system" Pod="coredns-76f75df574-nw5qp" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.358174 env[1410]: 2024-12-13 01:49:36.319 [INFO][4564] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali807fb92ee44 ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Namespace="kube-system" Pod="coredns-76f75df574-nw5qp" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.358174 env[1410]: 2024-12-13 01:49:36.340 [INFO][4564] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Namespace="kube-system" Pod="coredns-76f75df574-nw5qp" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.358174 env[1410]: 2024-12-13 01:49:36.341 [INFO][4564] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Namespace="kube-system" Pod="coredns-76f75df574-nw5qp" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0", GenerateName:"coredns-76f75df574-", Namespace:"kube-system", SelfLink:"", UID:"e64acf22-94d3-4157-b902-e7cc7a167aa1", ResourceVersion:"885", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 40, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"76f75df574", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a", Pod:"coredns-76f75df574-nw5qp", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.81.69/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali807fb92ee44", MAC:"f6:17:71:c5:23:b1", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:36.358174 env[1410]: 2024-12-13 01:49:36.355 [INFO][4564] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a" Namespace="kube-system" Pod="coredns-76f75df574-nw5qp" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-coredns--76f75df574--nw5qp-eth0" Dec 13 01:49:36.391000 audit[4595]: NETFILTER_CFG table=filter:114 family=2 entries=9 op=nft_register_rule pid=4595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:36.391000 audit[4595]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe8d5276e0 a2=0 a3=7ffe8d5276cc items=0 ppid=2710 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.391000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:36.399501 env[1410]: time="2024-12-13T01:49:36.399219136Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:36.399501 env[1410]: time="2024-12-13T01:49:36.399264236Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:36.399501 env[1410]: time="2024-12-13T01:49:36.399280236Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:36.399501 env[1410]: time="2024-12-13T01:49:36.399414236Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a pid=4604 runtime=io.containerd.runc.v2 Dec 13 01:49:36.398000 audit[4595]: NETFILTER_CFG table=nat:115 family=2 entries=27 op=nft_register_chain pid=4595 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:36.398000 audit[4595]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffe8d5276e0 a2=0 a3=7ffe8d5276cc items=0 ppid=2710 pid=4595 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.398000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:36.413000 audit[4594]: NETFILTER_CFG table=filter:116 family=2 entries=38 op=nft_register_chain pid=4594 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:36.413000 audit[4594]: SYSCALL arch=c000003e syscall=46 success=yes exit=19392 a0=3 a1=7ffe984cb750 a2=0 a3=7ffe984cb73c items=0 ppid=3960 pid=4594 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.413000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:36.422627 systemd[1]: Started cri-containerd-09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a.scope. Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.462000 audit: BPF prog-id=189 op=LOAD Dec 13 01:49:36.463000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.463000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039643838666463653832313634356437643430663432323836356566 Dec 13 01:49:36.463000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.463000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.463000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039643838666463653832313634356437643430663432323836356566 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.464000 audit: BPF prog-id=190 op=LOAD Dec 13 01:49:36.464000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001c20b0 items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.464000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039643838666463653832313634356437643430663432323836356566 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit: BPF prog-id=191 op=LOAD Dec 13 01:49:36.465000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001c20f8 items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039643838666463653832313634356437643430663432323836356566 Dec 13 01:49:36.465000 audit: BPF prog-id=191 op=UNLOAD Dec 13 01:49:36.465000 audit: BPF prog-id=190 op=UNLOAD Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { perfmon } for pid=4614 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit[4614]: AVC avc: denied { bpf } for pid=4614 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.465000 audit: BPF prog-id=192 op=LOAD Dec 13 01:49:36.465000 audit[4614]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001c2508 items=0 ppid=4604 pid=4614 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.465000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3039643838666463653832313634356437643430663432323836356566 Dec 13 01:49:36.508244 env[1410]: time="2024-12-13T01:49:36.508196521Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-76f75df574-nw5qp,Uid:e64acf22-94d3-4157-b902-e7cc7a167aa1,Namespace:kube-system,Attempt:1,} returns sandbox id \"09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a\"" Dec 13 01:49:36.513476 env[1410]: time="2024-12-13T01:49:36.513197139Z" level=info msg="CreateContainer within sandbox \"09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 01:49:36.547183 env[1410]: time="2024-12-13T01:49:36.547127558Z" level=info msg="CreateContainer within sandbox \"09d88fdce821645d7d40f422865efa92b660abe23971d0e891e81152fc20d21a\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"3de3230844f44b307839506b1b5dad49db84b94be4092e5ab1b68eea8030c48a\"" Dec 13 01:49:36.548373 env[1410]: time="2024-12-13T01:49:36.548335063Z" level=info msg="StartContainer for \"3de3230844f44b307839506b1b5dad49db84b94be4092e5ab1b68eea8030c48a\"" Dec 13 01:49:36.569812 systemd[1]: Started cri-containerd-3de3230844f44b307839506b1b5dad49db84b94be4092e5ab1b68eea8030c48a.scope. Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit: BPF prog-id=193 op=LOAD Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4604 pid=4654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653332333038343466343462333037383339353036623162356461 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4604 pid=4654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653332333038343466343462333037383339353036623162356461 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.596000 audit: BPF prog-id=194 op=LOAD Dec 13 01:49:36.596000 audit[4654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001870b0 items=0 ppid=4604 pid=4654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.596000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653332333038343466343462333037383339353036623162356461 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit: BPF prog-id=195 op=LOAD Dec 13 01:49:36.597000 audit[4654]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001870f8 items=0 ppid=4604 pid=4654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653332333038343466343462333037383339353036623162356461 Dec 13 01:49:36.597000 audit: BPF prog-id=195 op=UNLOAD Dec 13 01:49:36.597000 audit: BPF prog-id=194 op=UNLOAD Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { perfmon } for pid=4654 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit[4654]: AVC avc: denied { bpf } for pid=4654 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:36.597000 audit: BPF prog-id=196 op=LOAD Dec 13 01:49:36.597000 audit[4654]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000187508 items=0 ppid=4604 pid=4654 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3364653332333038343466343462333037383339353036623162356461 Dec 13 01:49:36.621762 env[1410]: time="2024-12-13T01:49:36.621698422Z" level=info msg="StartContainer for \"3de3230844f44b307839506b1b5dad49db84b94be4092e5ab1b68eea8030c48a\" returns successfully" Dec 13 01:49:36.638711 systemd-networkd[1561]: cali5d7b4f94bab: Gained IPv6LL Dec 13 01:49:37.023108 env[1410]: time="2024-12-13T01:49:37.022989740Z" level=info msg="StopPodSandbox for \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\"" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.066 [INFO][4701] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.066 [INFO][4701] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" iface="eth0" netns="/var/run/netns/cni-32697621-e701-6f6b-5e40-9222aacf8aaa" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.067 [INFO][4701] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" iface="eth0" netns="/var/run/netns/cni-32697621-e701-6f6b-5e40-9222aacf8aaa" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.068 [INFO][4701] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" iface="eth0" netns="/var/run/netns/cni-32697621-e701-6f6b-5e40-9222aacf8aaa" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.068 [INFO][4701] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.068 [INFO][4701] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.094 [INFO][4708] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" HandleID="k8s-pod-network.e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.094 [INFO][4708] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.094 [INFO][4708] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.099 [WARNING][4708] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" HandleID="k8s-pod-network.e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.099 [INFO][4708] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" HandleID="k8s-pod-network.e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.101 [INFO][4708] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:37.103506 env[1410]: 2024-12-13 01:49:37.102 [INFO][4701] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f" Dec 13 01:49:37.104089 env[1410]: time="2024-12-13T01:49:37.103705323Z" level=info msg="TearDown network for sandbox \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\" successfully" Dec 13 01:49:37.104089 env[1410]: time="2024-12-13T01:49:37.103746523Z" level=info msg="StopPodSandbox for \"e98e0d030c622fd0950079e411901a6a6accfe5b685b9dad85d4b0889dd31e9f\" returns successfully" Dec 13 01:49:37.104844 env[1410]: time="2024-12-13T01:49:37.104809227Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7887df9486-6z9mj,Uid:d4a264b9-878a-4af4-a4ad-8324686559fc,Namespace:calico-apiserver,Attempt:1,}" Dec 13 01:49:37.192053 systemd[1]: run-netns-cni\x2d32697621\x2de701\x2d6f6b\x2d5e40\x2d9222aacf8aaa.mount: Deactivated successfully. Dec 13 01:49:37.313353 kubelet[2533]: I1213 01:49:37.313315 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="kube-system/coredns-76f75df574-nw5qp" podStartSLOduration=57.313260757 podStartE2EDuration="57.313260757s" podCreationTimestamp="2024-12-13 01:48:40 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:37.298134704 +0000 UTC m=+69.406249566" watchObservedRunningTime="2024-12-13 01:49:37.313260757 +0000 UTC m=+69.421375619" Dec 13 01:49:37.345948 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:49:37.346073 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali56017d65947: link becomes ready Dec 13 01:49:37.334912 systemd-networkd[1561]: cali56017d65947: Link UP Dec 13 01:49:37.355777 systemd-networkd[1561]: cali56017d65947: Gained carrier Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.220 [INFO][4714] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0 calico-apiserver-7887df9486- calico-apiserver d4a264b9-878a-4af4-a4ad-8324686559fc 898 0 2024-12-13 01:48:48 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:7887df9486 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-04a43feb01 calico-apiserver-7887df9486-6z9mj eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] cali56017d65947 [] []}} ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-6z9mj" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.220 [INFO][4714] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-6z9mj" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.248 [INFO][4727] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" HandleID="k8s-pod-network.acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.264 [INFO][4727] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" HandleID="k8s-pod-network.acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0002edc70), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-04a43feb01", "pod":"calico-apiserver-7887df9486-6z9mj", "timestamp":"2024-12-13 01:49:37.24838253 +0000 UTC"}, Hostname:"ci-3510.3.6-a-04a43feb01", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.264 [INFO][4727] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.264 [INFO][4727] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.264 [INFO][4727] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-04a43feb01' Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.266 [INFO][4727] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.270 [INFO][4727] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.274 [INFO][4727] ipam/ipam.go 489: Trying affinity for 192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.276 [INFO][4727] ipam/ipam.go 155: Attempting to load block cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.291 [INFO][4727] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.81.64/26 host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.291 [INFO][4727] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.81.64/26 handle="k8s-pod-network.acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.299 [INFO][4727] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.305 [INFO][4727] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.81.64/26 handle="k8s-pod-network.acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.317 [INFO][4727] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.81.70/26] block=192.168.81.64/26 handle="k8s-pod-network.acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.317 [INFO][4727] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.81.70/26] handle="k8s-pod-network.acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" host="ci-3510.3.6-a-04a43feb01" Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.317 [INFO][4727] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:37.368100 env[1410]: 2024-12-13 01:49:37.317 [INFO][4727] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.81.70/26] IPv6=[] ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" HandleID="k8s-pod-network.acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.369097 env[1410]: 2024-12-13 01:49:37.320 [INFO][4714] cni-plugin/k8s.go 386: Populated endpoint ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-6z9mj" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0", GenerateName:"calico-apiserver-7887df9486-", Namespace:"calico-apiserver", SelfLink:"", UID:"d4a264b9-878a-4af4-a4ad-8324686559fc", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7887df9486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"", Pod:"calico-apiserver-7887df9486-6z9mj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.81.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali56017d65947", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:37.369097 env[1410]: 2024-12-13 01:49:37.320 [INFO][4714] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.81.70/32] ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-6z9mj" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.369097 env[1410]: 2024-12-13 01:49:37.320 [INFO][4714] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali56017d65947 ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-6z9mj" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.369097 env[1410]: 2024-12-13 01:49:37.351 [INFO][4714] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-6z9mj" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.369097 env[1410]: 2024-12-13 01:49:37.352 [INFO][4714] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-6z9mj" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0", GenerateName:"calico-apiserver-7887df9486-", Namespace:"calico-apiserver", SelfLink:"", UID:"d4a264b9-878a-4af4-a4ad-8324686559fc", ResourceVersion:"898", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 48, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"7887df9486", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a", Pod:"calico-apiserver-7887df9486-6z9mj", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.81.70/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"cali56017d65947", MAC:"5a:5b:5c:63:ae:63", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:37.369097 env[1410]: 2024-12-13 01:49:37.365 [INFO][4714] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a" Namespace="calico-apiserver" Pod="calico-apiserver-7887df9486-6z9mj" WorkloadEndpoint="ci--3510.3.6--a--04a43feb01-k8s-calico--apiserver--7887df9486--6z9mj-eth0" Dec 13 01:49:37.381000 audit[4736]: NETFILTER_CFG table=filter:117 family=2 entries=8 op=nft_register_rule pid=4736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.381000 audit[4736]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe22025860 a2=0 a3=7ffe2202584c items=0 ppid=2710 pid=4736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.381000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:37.389000 audit[4736]: NETFILTER_CFG table=nat:118 family=2 entries=46 op=nft_register_rule pid=4736 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:37.389000 audit[4736]: SYSCALL arch=c000003e syscall=46 success=yes exit=14964 a0=3 a1=7ffe22025860 a2=0 a3=7ffe2202584c items=0 ppid=2710 pid=4736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.389000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:37.394407 env[1410]: time="2024-12-13T01:49:37.394340941Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:37.394542 env[1410]: time="2024-12-13T01:49:37.394418241Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:37.394542 env[1410]: time="2024-12-13T01:49:37.394464142Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:37.394661 env[1410]: time="2024-12-13T01:49:37.394627542Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a pid=4757 runtime=io.containerd.runc.v2 Dec 13 01:49:37.407000 audit[4765]: NETFILTER_CFG table=filter:119 family=2 entries=52 op=nft_register_chain pid=4765 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:37.407000 audit[4765]: SYSCALL arch=c000003e syscall=46 success=yes exit=26728 a0=3 a1=7fffadaf6380 a2=0 a3=7fffadaf636c items=0 ppid=3960 pid=4765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.407000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:37.428708 systemd[1]: Started cri-containerd-acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a.scope. Dec 13 01:49:37.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.460000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.460000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit: BPF prog-id=197 op=LOAD Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4757 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626237376337303166613930353561313234643461386639313238 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4757 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626237376337303166613930353561313234643461386639313238 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit: BPF prog-id=198 op=LOAD Dec 13 01:49:37.461000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0003816c0 items=0 ppid=4757 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626237376337303166613930353561313234643461386639313238 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.461000 audit: BPF prog-id=199 op=LOAD Dec 13 01:49:37.461000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000381708 items=0 ppid=4757 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.461000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626237376337303166613930353561313234643461386639313238 Dec 13 01:49:37.462000 audit: BPF prog-id=199 op=UNLOAD Dec 13 01:49:37.462000 audit: BPF prog-id=198 op=UNLOAD Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { perfmon } for pid=4766 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit[4766]: AVC avc: denied { bpf } for pid=4766 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.462000 audit: BPF prog-id=200 op=LOAD Dec 13 01:49:37.462000 audit[4766]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000381b18 items=0 ppid=4757 pid=4766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.462000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6163626237376337303166613930353561313234643461386639313238 Dec 13 01:49:37.503760 env[1410]: time="2024-12-13T01:49:37.503706224Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-7887df9486-6z9mj,Uid:d4a264b9-878a-4af4-a4ad-8324686559fc,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a\"" Dec 13 01:49:37.507400 env[1410]: time="2024-12-13T01:49:37.507355037Z" level=info msg="CreateContainer within sandbox \"acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 01:49:37.550679 env[1410]: time="2024-12-13T01:49:37.550632189Z" level=info msg="CreateContainer within sandbox \"acbb77c701fa9055a124d4a8f912880932f655bba9cb28260cb406f21d14fc8a\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"0ff53bb2b62e5eccbbbc5a9dc746e1515ab49922b78a041323b1dd3b09ba9287\"" Dec 13 01:49:37.551586 env[1410]: time="2024-12-13T01:49:37.551550692Z" level=info msg="StartContainer for \"0ff53bb2b62e5eccbbbc5a9dc746e1515ab49922b78a041323b1dd3b09ba9287\"" Dec 13 01:49:37.574769 systemd[1]: Started cri-containerd-0ff53bb2b62e5eccbbbc5a9dc746e1515ab49922b78a041323b1dd3b09ba9287.scope. Dec 13 01:49:37.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.606000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.606000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.607000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.607000 audit: BPF prog-id=201 op=LOAD Dec 13 01:49:37.608000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.608000 audit[4801]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4757 pid=4801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.608000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663533626232623632653565636362626263356139646337343665 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4757 pid=4801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663533626232623632653565636362626263356139646337343665 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.609000 audit: BPF prog-id=202 op=LOAD Dec 13 01:49:37.609000 audit[4801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c00018bfa0 items=0 ppid=4757 pid=4801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.609000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663533626232623632653565636362626263356139646337343665 Dec 13 01:49:37.610000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.610000 audit: BPF prog-id=203 op=LOAD Dec 13 01:49:37.610000 audit[4801]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c00018bfe8 items=0 ppid=4757 pid=4801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.610000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663533626232623632653565636362626263356139646337343665 Dec 13 01:49:37.611000 audit: BPF prog-id=203 op=UNLOAD Dec 13 01:49:37.611000 audit: BPF prog-id=202 op=UNLOAD Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { perfmon } for pid=4801 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit[4801]: AVC avc: denied { bpf } for pid=4801 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.612000 audit: BPF prog-id=204 op=LOAD Dec 13 01:49:37.612000 audit[4801]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0001ce3f8 items=0 ppid=4757 pid=4801 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.612000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066663533626232623632653565636362626263356139646337343665 Dec 13 01:49:37.652252 env[1410]: time="2024-12-13T01:49:37.652189145Z" level=info msg="StartContainer for \"0ff53bb2b62e5eccbbbc5a9dc746e1515ab49922b78a041323b1dd3b09ba9287\" returns successfully" Dec 13 01:49:37.982729 systemd-networkd[1561]: cali807fb92ee44: Gained IPv6LL Dec 13 01:49:38.311865 kubelet[2533]: I1213 01:49:38.311348 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-7887df9486-6z9mj" podStartSLOduration=50.311294445 podStartE2EDuration="50.311294445s" podCreationTimestamp="2024-12-13 01:48:48 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:38.310291741 +0000 UTC m=+70.418406603" watchObservedRunningTime="2024-12-13 01:49:38.311294445 +0000 UTC m=+70.419409307" Dec 13 01:49:38.377000 audit[4833]: NETFILTER_CFG table=filter:120 family=2 entries=8 op=nft_register_rule pid=4833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:38.377000 audit[4833]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffe4bb5b4f0 a2=0 a3=7ffe4bb5b4dc items=0 ppid=2710 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:38.377000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:38.435000 audit[4833]: NETFILTER_CFG table=nat:121 family=2 entries=66 op=nft_register_chain pid=4833 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:38.435000 audit[4833]: SYSCALL arch=c000003e syscall=46 success=yes exit=23436 a0=3 a1=7ffe4bb5b4f0 a2=0 a3=7ffe4bb5b4dc items=0 ppid=2710 pid=4833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:38.435000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:38.612000 audit[4814]: AVC avc: denied { watch } for pid=4814 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_03.1168106821/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c98,c566 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c98,c566 tclass=file permissive=0 Dec 13 01:49:38.612000 audit[4814]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c00072f840 a2=fc6 a3=0 items=0 ppid=4757 pid=4814 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c98,c566 key=(null) Dec 13 01:49:38.612000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:49:38.947158 env[1410]: time="2024-12-13T01:49:38.946853353Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:38.954666 env[1410]: time="2024-12-13T01:49:38.954624380Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:38.958296 env[1410]: time="2024-12-13T01:49:38.958248292Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:38.966174 env[1410]: time="2024-12-13T01:49:38.966131220Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:38.966695 env[1410]: time="2024-12-13T01:49:38.966659621Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 01:49:38.969771 env[1410]: time="2024-12-13T01:49:38.969740932Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 01:49:38.989341 env[1410]: time="2024-12-13T01:49:38.989288700Z" level=info msg="CreateContainer within sandbox \"1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 01:49:39.025983 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2533817310.mount: Deactivated successfully. Dec 13 01:49:39.037715 env[1410]: time="2024-12-13T01:49:39.037664467Z" level=info msg="CreateContainer within sandbox \"1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\"" Dec 13 01:49:39.039688 env[1410]: time="2024-12-13T01:49:39.038493270Z" level=info msg="StartContainer for \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\"" Dec 13 01:49:39.057506 systemd[1]: Started cri-containerd-bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a.scope. Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.080000 audit: BPF prog-id=205 op=LOAD Dec 13 01:49:39.081000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.081000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=4422 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373366313736343365323138336637323162393162626439636437 Dec 13 01:49:39.081000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.081000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=4422 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373366313736343365323138336637323162393162626439636437 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit: BPF prog-id=206 op=LOAD Dec 13 01:49:39.082000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000024990 items=0 ppid=4422 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373366313736343365323138336637323162393162626439636437 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.082000 audit: BPF prog-id=207 op=LOAD Dec 13 01:49:39.082000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c0000249d8 items=0 ppid=4422 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373366313736343365323138336637323162393162626439636437 Dec 13 01:49:39.083000 audit: BPF prog-id=207 op=UNLOAD Dec 13 01:49:39.083000 audit: BPF prog-id=206 op=UNLOAD Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { perfmon } for pid=4844 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit[4844]: AVC avc: denied { bpf } for pid=4844 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.083000 audit: BPF prog-id=208 op=LOAD Dec 13 01:49:39.083000 audit[4844]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c000024de8 items=0 ppid=4422 pid=4844 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.083000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6263373366313736343365323138336637323162393162626439636437 Dec 13 01:49:39.116161 env[1410]: time="2024-12-13T01:49:39.116107137Z" level=info msg="StartContainer for \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\" returns successfully" Dec 13 01:49:39.262675 systemd-networkd[1561]: cali56017d65947: Gained IPv6LL Dec 13 01:49:39.334358 systemd[1]: run-containerd-runc-k8s.io-bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a-runc.U3Ydu1.mount: Deactivated successfully. Dec 13 01:49:39.372912 kubelet[2533]: I1213 01:49:39.372883 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-6f89f797c7-8wmvk" podStartSLOduration=48.268476562 podStartE2EDuration="52.372832822s" podCreationTimestamp="2024-12-13 01:48:47 +0000 UTC" firstStartedPulling="2024-12-13 01:49:34.862803363 +0000 UTC m=+66.970918225" lastFinishedPulling="2024-12-13 01:49:38.967159623 +0000 UTC m=+71.075274485" observedRunningTime="2024-12-13 01:49:39.320846543 +0000 UTC m=+71.428961405" watchObservedRunningTime="2024-12-13 01:49:39.372832822 +0000 UTC m=+71.480947684" Dec 13 01:49:39.447000 audit[4894]: NETFILTER_CFG table=filter:122 family=2 entries=8 op=nft_register_rule pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:39.452929 kernel: kauditd_printk_skb: 594 callbacks suppressed Dec 13 01:49:39.453045 kernel: audit: type=1325 audit(1734054579.447:1324): table=filter:122 family=2 entries=8 op=nft_register_rule pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:39.447000 audit[4894]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc8649ba10 a2=0 a3=7ffc8649b9fc items=0 ppid=2710 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.486132 kernel: audit: type=1300 audit(1734054579.447:1324): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffc8649ba10 a2=0 a3=7ffc8649b9fc items=0 ppid=2710 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.447000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:39.496377 kernel: audit: type=1327 audit(1734054579.447:1324): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:39.487000 audit[4894]: NETFILTER_CFG table=nat:123 family=2 entries=34 op=nft_register_chain pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:39.507659 kernel: audit: type=1325 audit(1734054579.487:1325): table=nat:123 family=2 entries=34 op=nft_register_chain pid=4894 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:39.507780 kernel: audit: type=1300 audit(1734054579.487:1325): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc8649ba10 a2=0 a3=7ffc8649b9fc items=0 ppid=2710 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.487000 audit[4894]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffc8649ba10 a2=0 a3=7ffc8649b9fc items=0 ppid=2710 pid=4894 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.487000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:39.538673 kernel: audit: type=1327 audit(1734054579.487:1325): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:40.597135 env[1410]: time="2024-12-13T01:49:40.597084122Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:40.603582 env[1410]: time="2024-12-13T01:49:40.603535144Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:40.608813 env[1410]: time="2024-12-13T01:49:40.608777162Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:40.617620 env[1410]: time="2024-12-13T01:49:40.617581892Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:40.618127 env[1410]: time="2024-12-13T01:49:40.618092994Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 01:49:40.621675 env[1410]: time="2024-12-13T01:49:40.621641206Z" level=info msg="CreateContainer within sandbox \"764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 01:49:40.664354 env[1410]: time="2024-12-13T01:49:40.664300051Z" level=info msg="CreateContainer within sandbox \"764ddd45e0d5e8ded4bc193e4bf26e0036a2e6ade1fce15f8e48dfef1128e5c4\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"1f26f53b62a36faed5ae48dc94215637534ec6d5bbfa17a5882c09d2127ad7e5\"" Dec 13 01:49:40.665178 env[1410]: time="2024-12-13T01:49:40.665133754Z" level=info msg="StartContainer for \"1f26f53b62a36faed5ae48dc94215637534ec6d5bbfa17a5882c09d2127ad7e5\"" Dec 13 01:49:40.712178 systemd[1]: Started cri-containerd-1f26f53b62a36faed5ae48dc94215637534ec6d5bbfa17a5882c09d2127ad7e5.scope. Dec 13 01:49:40.741722 kernel: audit: type=1400 audit(1734054580.725:1326): avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9c4426fcb8 items=0 ppid=4178 pid=4902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323666353362363261333666616564356165343864633934323135 Dec 13 01:49:40.785212 kernel: audit: type=1300 audit(1734054580.725:1326): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7f9c4426fcb8 items=0 ppid=4178 pid=4902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.785349 kernel: audit: type=1327 audit(1734054580.725:1326): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323666353362363261333666616564356165343864633934323135 Dec 13 01:49:40.785375 kernel: audit: type=1400 audit(1734054580.725:1327): avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.725000 audit: BPF prog-id=209 op=LOAD Dec 13 01:49:40.725000 audit[4902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c000314ca8 items=0 ppid=4178 pid=4902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.725000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323666353362363261333666616564356165343864633934323135 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.798201 env[1410]: time="2024-12-13T01:49:40.798133809Z" level=info msg="StartContainer for \"1f26f53b62a36faed5ae48dc94215637534ec6d5bbfa17a5882c09d2127ad7e5\" returns successfully" Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit: BPF prog-id=210 op=LOAD Dec 13 01:49:40.741000 audit[4902]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c000314cf8 items=0 ppid=4178 pid=4902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323666353362363261333666616564356165343864633934323135 Dec 13 01:49:40.741000 audit: BPF prog-id=210 op=UNLOAD Dec 13 01:49:40.741000 audit: BPF prog-id=209 op=UNLOAD Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { perfmon } for pid=4902 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit[4902]: AVC avc: denied { bpf } for pid=4902 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:40.741000 audit: BPF prog-id=211 op=LOAD Dec 13 01:49:40.741000 audit[4902]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c000314d88 items=0 ppid=4178 pid=4902 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:40.741000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3166323666353362363261333666616564356165343864633934323135 Dec 13 01:49:41.134096 kubelet[2533]: I1213 01:49:41.134059 2533 csi_plugin.go:99] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 01:49:41.134096 kubelet[2533]: I1213 01:49:41.134099 2533 csi_plugin.go:112] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 01:49:41.322725 kubelet[2533]: I1213 01:49:41.322668 2533 pod_startup_latency_tracker.go:102] "Observed pod startup duration" pod="calico-system/csi-node-driver-fnbwv" podStartSLOduration=45.16193334 podStartE2EDuration="54.322598992s" podCreationTimestamp="2024-12-13 01:48:47 +0000 UTC" firstStartedPulling="2024-12-13 01:49:31.458187044 +0000 UTC m=+63.566301906" lastFinishedPulling="2024-12-13 01:49:40.618852696 +0000 UTC m=+72.726967558" observedRunningTime="2024-12-13 01:49:41.321748389 +0000 UTC m=+73.429863351" watchObservedRunningTime="2024-12-13 01:49:41.322598992 +0000 UTC m=+73.430713954" Dec 13 01:49:48.285223 env[1410]: time="2024-12-13T01:49:48.285171510Z" level=info msg="StopContainer for \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\" with timeout 300 (s)" Dec 13 01:49:48.286145 env[1410]: time="2024-12-13T01:49:48.286100113Z" level=info msg="Stop container \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\" with signal terminated" Dec 13 01:49:48.327000 audit[4951]: NETFILTER_CFG table=filter:124 family=2 entries=8 op=nft_register_rule pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:48.333331 kernel: kauditd_printk_skb: 39 callbacks suppressed Dec 13 01:49:48.333475 kernel: audit: type=1325 audit(1734054588.327:1332): table=filter:124 family=2 entries=8 op=nft_register_rule pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:48.327000 audit[4951]: SYSCALL arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdad463c10 a2=0 a3=7ffdad463bfc items=0 ppid=2710 pid=4951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:48.373484 kernel: audit: type=1300 audit(1734054588.327:1332): arch=c000003e syscall=46 success=yes exit=2932 a0=3 a1=7ffdad463c10 a2=0 a3=7ffdad463bfc items=0 ppid=2710 pid=4951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:48.327000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:48.391502 kernel: audit: type=1327 audit(1734054588.327:1332): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:48.391640 kernel: audit: type=1325 audit(1734054588.353:1333): table=nat:125 family=2 entries=30 op=nft_register_rule pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:48.353000 audit[4951]: NETFILTER_CFG table=nat:125 family=2 entries=30 op=nft_register_rule pid=4951 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:48.353000 audit[4951]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdad463c10 a2=0 a3=7ffdad463bfc items=0 ppid=2710 pid=4951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:48.426469 kernel: audit: type=1300 audit(1734054588.353:1333): arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffdad463c10 a2=0 a3=7ffdad463bfc items=0 ppid=2710 pid=4951 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:48.426589 kernel: audit: type=1327 audit(1734054588.353:1333): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:48.353000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:48.461673 systemd[1]: run-containerd-runc-k8s.io-c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d-runc.C6tlg0.mount: Deactivated successfully. Dec 13 01:49:48.524070 systemd[1]: run-containerd-runc-k8s.io-c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d-runc.5P0HWP.mount: Deactivated successfully. Dec 13 01:49:48.543677 env[1410]: time="2024-12-13T01:49:48.543533442Z" level=info msg="StopContainer for \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\" with timeout 30 (s)" Dec 13 01:49:48.547221 env[1410]: time="2024-12-13T01:49:48.547169054Z" level=info msg="Stop container \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\" with signal terminated" Dec 13 01:49:48.567670 systemd[1]: cri-containerd-bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a.scope: Deactivated successfully. Dec 13 01:49:48.567000 audit: BPF prog-id=205 op=UNLOAD Dec 13 01:49:48.575499 kernel: audit: type=1334 audit(1734054588.567:1334): prog-id=205 op=UNLOAD Dec 13 01:49:48.575000 audit: BPF prog-id=208 op=UNLOAD Dec 13 01:49:48.583472 kernel: audit: type=1334 audit(1734054588.575:1335): prog-id=208 op=UNLOAD Dec 13 01:49:48.722213 env[1410]: time="2024-12-13T01:49:48.722168917Z" level=info msg="StopContainer for \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\" with timeout 5 (s)" Dec 13 01:49:48.722541 env[1410]: time="2024-12-13T01:49:48.722508218Z" level=info msg="Stop container \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\" with signal terminated" Dec 13 01:49:48.757460 systemd[1]: cri-containerd-c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d.scope: Deactivated successfully. Dec 13 01:49:48.757799 systemd[1]: cri-containerd-c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d.scope: Consumed 1.651s CPU time. Dec 13 01:49:48.785082 env[1410]: time="2024-12-13T01:49:48.785015320Z" level=info msg="shim disconnected" id=c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d Dec 13 01:49:48.785439 env[1410]: time="2024-12-13T01:49:48.785411621Z" level=warning msg="cleaning up after shim disconnected" id=c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d namespace=k8s.io Dec 13 01:49:48.785614 env[1410]: time="2024-12-13T01:49:48.785594222Z" level=info msg="cleaning up dead shim" Dec 13 01:49:48.797187 env[1410]: time="2024-12-13T01:49:48.797072858Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:48Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5034 runtime=io.containerd.runc.v2\n" Dec 13 01:49:49.458518 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a-rootfs.mount: Deactivated successfully. Dec 13 01:49:49.458686 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d-rootfs.mount: Deactivated successfully. Dec 13 01:49:50.529957 kernel: audit: type=1334 audit(1734054590.203:1336): prog-id=130 op=UNLOAD Dec 13 01:49:50.530157 kernel: audit: type=1334 audit(1734054590.212:1337): prog-id=133 op=UNLOAD Dec 13 01:49:50.203000 audit: BPF prog-id=130 op=UNLOAD Dec 13 01:49:50.212000 audit: BPF prog-id=133 op=UNLOAD Dec 13 01:49:50.530381 env[1410]: time="2024-12-13T01:49:50.236987863Z" level=info msg="shim disconnected" id=5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266 Dec 13 01:49:50.530381 env[1410]: time="2024-12-13T01:49:50.237029964Z" level=warning msg="cleaning up after shim disconnected" id=5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266 namespace=k8s.io Dec 13 01:49:50.530381 env[1410]: time="2024-12-13T01:49:50.237038464Z" level=info msg="cleaning up dead shim" Dec 13 01:49:50.530381 env[1410]: time="2024-12-13T01:49:50.244513887Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5061 runtime=io.containerd.runc.v2\n" Dec 13 01:49:50.203643 systemd[1]: cri-containerd-5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266.scope: Deactivated successfully. Dec 13 01:49:50.235325 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266-rootfs.mount: Deactivated successfully. Dec 13 01:49:53.573850 env[1410]: time="2024-12-13T01:49:53.573723975Z" level=info msg="shim disconnected" id=bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a Dec 13 01:49:53.573850 env[1410]: time="2024-12-13T01:49:53.573781775Z" level=warning msg="cleaning up after shim disconnected" id=bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a namespace=k8s.io Dec 13 01:49:53.573850 env[1410]: time="2024-12-13T01:49:53.573796175Z" level=info msg="cleaning up dead shim" Dec 13 01:49:53.579018 env[1410]: time="2024-12-13T01:49:53.578963491Z" level=info msg="StopContainer for \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\" returns successfully" Dec 13 01:49:53.579977 env[1410]: time="2024-12-13T01:49:53.579906894Z" level=info msg="StopPodSandbox for \"7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b\"" Dec 13 01:49:53.580243 env[1410]: time="2024-12-13T01:49:53.580219695Z" level=info msg="Container to stop \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 01:49:53.584358 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b-shm.mount: Deactivated successfully. Dec 13 01:49:53.584964 env[1410]: time="2024-12-13T01:49:53.584931810Z" level=info msg="StopContainer for \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\" returns successfully" Dec 13 01:49:53.586303 env[1410]: time="2024-12-13T01:49:53.586272014Z" level=info msg="StopPodSandbox for \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\"" Dec 13 01:49:53.586404 env[1410]: time="2024-12-13T01:49:53.586337214Z" level=info msg="Container to stop \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 01:49:53.586404 env[1410]: time="2024-12-13T01:49:53.586357014Z" level=info msg="Container to stop \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 01:49:53.586404 env[1410]: time="2024-12-13T01:49:53.586374514Z" level=info msg="Container to stop \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 01:49:53.590194 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a-shm.mount: Deactivated successfully. Dec 13 01:49:53.596384 env[1410]: time="2024-12-13T01:49:53.596343445Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5075 runtime=io.containerd.runc.v2\n" Dec 13 01:49:53.602013 systemd[1]: cri-containerd-373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a.scope: Deactivated successfully. Dec 13 01:49:53.601000 audit: BPF prog-id=126 op=UNLOAD Dec 13 01:49:53.609115 kernel: audit: type=1334 audit(1734054593.601:1338): prog-id=126 op=UNLOAD Dec 13 01:49:53.609940 kernel: audit: type=1334 audit(1734054593.608:1339): prog-id=122 op=UNLOAD Dec 13 01:49:53.608000 audit: BPF prog-id=122 op=UNLOAD Dec 13 01:49:53.608322 systemd[1]: cri-containerd-7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b.scope: Deactivated successfully. Dec 13 01:49:53.615930 env[1410]: time="2024-12-13T01:49:53.615893606Z" level=info msg="StopContainer for \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\" returns successfully" Dec 13 01:49:53.617204 env[1410]: time="2024-12-13T01:49:53.616684909Z" level=info msg="StopPodSandbox for \"1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837\"" Dec 13 01:49:53.617204 env[1410]: time="2024-12-13T01:49:53.616751509Z" level=info msg="Container to stop \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\" must be in running or unknown state, current state \"CONTAINER_EXITED\"" Dec 13 01:49:53.625324 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837-shm.mount: Deactivated successfully. Dec 13 01:49:53.614000 audit: BPF prog-id=129 op=UNLOAD Dec 13 01:49:53.637510 kernel: audit: type=1334 audit(1734054593.614:1340): prog-id=129 op=UNLOAD Dec 13 01:49:53.614000 audit: BPF prog-id=125 op=UNLOAD Dec 13 01:49:53.644472 kernel: audit: type=1334 audit(1734054593.614:1341): prog-id=125 op=UNLOAD Dec 13 01:49:53.646538 env[1410]: time="2024-12-13T01:49:53.646491002Z" level=info msg="shim disconnected" id=373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a Dec 13 01:49:53.646703 env[1410]: time="2024-12-13T01:49:53.646679402Z" level=warning msg="cleaning up after shim disconnected" id=373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a namespace=k8s.io Dec 13 01:49:53.646796 env[1410]: time="2024-12-13T01:49:53.646781603Z" level=info msg="cleaning up dead shim" Dec 13 01:49:53.649564 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a-rootfs.mount: Deactivated successfully. Dec 13 01:49:53.654525 systemd[1]: cri-containerd-1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837.scope: Deactivated successfully. Dec 13 01:49:53.654000 audit: BPF prog-id=178 op=UNLOAD Dec 13 01:49:53.660462 kernel: audit: type=1334 audit(1734054593.654:1342): prog-id=178 op=UNLOAD Dec 13 01:49:53.662000 audit: BPF prog-id=181 op=UNLOAD Dec 13 01:49:53.664511 env[1410]: time="2024-12-13T01:49:53.664346158Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5123 runtime=io.containerd.runc.v2\n" Dec 13 01:49:53.671017 kernel: audit: type=1334 audit(1734054593.662:1343): prog-id=181 op=UNLOAD Dec 13 01:49:53.696051 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b-rootfs.mount: Deactivated successfully. Dec 13 01:49:53.700780 env[1410]: time="2024-12-13T01:49:53.700730271Z" level=info msg="shim disconnected" id=7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b Dec 13 01:49:53.701768 env[1410]: time="2024-12-13T01:49:53.701016972Z" level=warning msg="cleaning up after shim disconnected" id=7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b namespace=k8s.io Dec 13 01:49:53.701768 env[1410]: time="2024-12-13T01:49:53.701045272Z" level=info msg="cleaning up dead shim" Dec 13 01:49:53.702692 env[1410]: time="2024-12-13T01:49:53.702650277Z" level=info msg="TearDown network for sandbox \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\" successfully" Dec 13 01:49:53.702859 env[1410]: time="2024-12-13T01:49:53.702831978Z" level=info msg="StopPodSandbox for \"373d9f38c398a8a946afc7dd82f2c8d72793080cf4449039d9df85fc25466c5a\" returns successfully" Dec 13 01:49:53.712960 env[1410]: time="2024-12-13T01:49:53.712795409Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5157 runtime=io.containerd.runc.v2\n" Dec 13 01:49:53.723677 env[1410]: time="2024-12-13T01:49:53.723621343Z" level=info msg="shim disconnected" id=1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837 Dec 13 01:49:53.723677 env[1410]: time="2024-12-13T01:49:53.723672643Z" level=warning msg="cleaning up after shim disconnected" id=1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837 namespace=k8s.io Dec 13 01:49:53.723938 env[1410]: time="2024-12-13T01:49:53.723684743Z" level=info msg="cleaning up dead shim" Dec 13 01:49:53.736102 env[1410]: time="2024-12-13T01:49:53.736057381Z" level=info msg="TearDown network for sandbox \"7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b\" successfully" Dec 13 01:49:53.736317 env[1410]: time="2024-12-13T01:49:53.736287382Z" level=info msg="StopPodSandbox for \"7213f04350cbb52ff6c70c5bff60cc8e34e53aa695b6f430a47c51480cf79f1b\" returns successfully" Dec 13 01:49:53.741205 env[1410]: time="2024-12-13T01:49:53.741065497Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:53Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5171 runtime=io.containerd.runc.v2\n" Dec 13 01:49:53.753842 kubelet[2533]: I1213 01:49:53.753806 2533 topology_manager.go:215] "Topology Admit Handler" podUID="da793b9f-011b-4469-b5d1-3693c55a2ce7" podNamespace="calico-system" podName="calico-node-bpvq5" Dec 13 01:49:53.754334 kubelet[2533]: E1213 01:49:53.753895 2533 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="14ecfa96-b557-4ab3-9583-f36c9e3aad8a" containerName="flexvol-driver" Dec 13 01:49:53.754334 kubelet[2533]: E1213 01:49:53.753913 2533 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="14ecfa96-b557-4ab3-9583-f36c9e3aad8a" containerName="install-cni" Dec 13 01:49:53.754334 kubelet[2533]: E1213 01:49:53.753939 2533 cpu_manager.go:395] "RemoveStaleState: removing container" podUID="14ecfa96-b557-4ab3-9583-f36c9e3aad8a" containerName="calico-node" Dec 13 01:49:53.754334 kubelet[2533]: I1213 01:49:53.753984 2533 memory_manager.go:354] "RemoveStaleState removing state" podUID="14ecfa96-b557-4ab3-9583-f36c9e3aad8a" containerName="calico-node" Dec 13 01:49:53.756775 kubelet[2533]: I1213 01:49:53.756045 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-policysync\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.756775 kubelet[2533]: I1213 01:49:53.756097 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-policysync" (OuterVolumeSpecName: "policysync") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "policysync". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 01:49:53.756775 kubelet[2533]: I1213 01:49:53.756215 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/da793b9f-011b-4469-b5d1-3693c55a2ce7-node-certs\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.756775 kubelet[2533]: I1213 01:49:53.756248 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/da793b9f-011b-4469-b5d1-3693c55a2ce7-var-lib-calico\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.756775 kubelet[2533]: I1213 01:49:53.756279 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/da793b9f-011b-4469-b5d1-3693c55a2ce7-cni-net-dir\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757055 kubelet[2533]: I1213 01:49:53.756306 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/da793b9f-011b-4469-b5d1-3693c55a2ce7-lib-modules\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757055 kubelet[2533]: I1213 01:49:53.756332 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/da793b9f-011b-4469-b5d1-3693c55a2ce7-tigera-ca-bundle\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757055 kubelet[2533]: I1213 01:49:53.756358 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/da793b9f-011b-4469-b5d1-3693c55a2ce7-var-run-calico\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757055 kubelet[2533]: I1213 01:49:53.756387 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/da793b9f-011b-4469-b5d1-3693c55a2ce7-cni-log-dir\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757055 kubelet[2533]: I1213 01:49:53.756415 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/da793b9f-011b-4469-b5d1-3693c55a2ce7-flexvol-driver-host\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757254 kubelet[2533]: I1213 01:49:53.756468 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/da793b9f-011b-4469-b5d1-3693c55a2ce7-xtables-lock\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757254 kubelet[2533]: I1213 01:49:53.756500 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/da793b9f-011b-4469-b5d1-3693c55a2ce7-cni-bin-dir\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757254 kubelet[2533]: I1213 01:49:53.756529 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ktj8c\" (UniqueName: \"kubernetes.io/projected/da793b9f-011b-4469-b5d1-3693c55a2ce7-kube-api-access-ktj8c\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757254 kubelet[2533]: I1213 01:49:53.756557 2533 reconciler_common.go:258] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/da793b9f-011b-4469-b5d1-3693c55a2ce7-policysync\") pod \"calico-node-bpvq5\" (UID: \"da793b9f-011b-4469-b5d1-3693c55a2ce7\") " pod="calico-system/calico-node-bpvq5" Dec 13 01:49:53.757254 kubelet[2533]: I1213 01:49:53.756588 2533 reconciler_common.go:300] "Volume detached for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-policysync\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.762637 systemd[1]: Created slice kubepods-besteffort-podda793b9f_011b_4469_b5d1_3693c55a2ce7.slice. Dec 13 01:49:53.833000 audit[5205]: NETFILTER_CFG table=filter:126 family=2 entries=9 op=nft_register_rule pid=5205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:53.833000 audit[5205]: SYSCALL arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe27510e60 a2=0 a3=7ffe27510e4c items=0 ppid=2710 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:53.857741 kubelet[2533]: I1213 01:49:53.856896 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-5pmhs\" (UniqueName: \"kubernetes.io/projected/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-kube-api-access-5pmhs\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.857741 kubelet[2533]: I1213 01:49:53.856935 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-var-run-calico\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.857741 kubelet[2533]: I1213 01:49:53.856960 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-tigera-ca-bundle\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.857741 kubelet[2533]: I1213 01:49:53.856979 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-typha-certs\") pod \"fe6e7cab-4f1d-4514-855e-fce60d7b4f06\" (UID: \"fe6e7cab-4f1d-4514-855e-fce60d7b4f06\") " Dec 13 01:49:53.857741 kubelet[2533]: I1213 01:49:53.857000 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-xtables-lock\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.857741 kubelet[2533]: I1213 01:49:53.857019 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-t548f\" (UniqueName: \"kubernetes.io/projected/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-kube-api-access-t548f\") pod \"fe6e7cab-4f1d-4514-855e-fce60d7b4f06\" (UID: \"fe6e7cab-4f1d-4514-855e-fce60d7b4f06\") " Dec 13 01:49:53.858027 kubelet[2533]: I1213 01:49:53.857040 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-node-certs\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.858027 kubelet[2533]: I1213 01:49:53.857060 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-flexvol-driver-host\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.858027 kubelet[2533]: I1213 01:49:53.857078 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-bin-dir\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.858027 kubelet[2533]: I1213 01:49:53.857101 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-log-dir\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.858027 kubelet[2533]: I1213 01:49:53.857122 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-tigera-ca-bundle\") pod \"fe6e7cab-4f1d-4514-855e-fce60d7b4f06\" (UID: \"fe6e7cab-4f1d-4514-855e-fce60d7b4f06\") " Dec 13 01:49:53.858027 kubelet[2533]: I1213 01:49:53.857140 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-net-dir\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.858210 kubelet[2533]: I1213 01:49:53.857163 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-var-lib-calico\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.858210 kubelet[2533]: I1213 01:49:53.857182 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-lib-modules\") pod \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\" (UID: \"14ecfa96-b557-4ab3-9583-f36c9e3aad8a\") " Dec 13 01:49:53.864938 kubelet[2533]: I1213 01:49:53.864536 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-var-lib-calico" (OuterVolumeSpecName: "var-lib-calico") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "var-lib-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 01:49:53.864938 kubelet[2533]: I1213 01:49:53.864593 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-var-run-calico" (OuterVolumeSpecName: "var-run-calico") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "var-run-calico". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 01:49:53.867261 kernel: audit: type=1325 audit(1734054593.833:1344): table=filter:126 family=2 entries=9 op=nft_register_rule pid=5205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:53.867375 kernel: audit: type=1300 audit(1734054593.833:1344): arch=c000003e syscall=46 success=yes exit=3676 a0=3 a1=7ffe27510e60 a2=0 a3=7ffe27510e4c items=0 ppid=2710 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:53.869142 systemd-networkd[1561]: cali5d7b4f94bab: Link DOWN Dec 13 01:49:53.869150 systemd-networkd[1561]: cali5d7b4f94bab: Lost carrier Dec 13 01:49:53.873700 kubelet[2533]: I1213 01:49:53.873659 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-lib-modules" (OuterVolumeSpecName: "lib-modules") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "lib-modules". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 01:49:53.880946 kubelet[2533]: I1213 01:49:53.875232 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-xtables-lock" (OuterVolumeSpecName: "xtables-lock") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "xtables-lock". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 01:49:53.833000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:53.891540 kubelet[2533]: I1213 01:49:53.891510 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-flexvol-driver-host" (OuterVolumeSpecName: "flexvol-driver-host") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "flexvol-driver-host". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 01:49:53.891681 kubelet[2533]: I1213 01:49:53.891666 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-bin-dir" (OuterVolumeSpecName: "cni-bin-dir") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "cni-bin-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 01:49:53.891794 kubelet[2533]: I1213 01:49:53.891780 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-log-dir" (OuterVolumeSpecName: "cni-log-dir") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "cni-log-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 01:49:53.892365 kubelet[2533]: I1213 01:49:53.892336 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-kube-api-access-5pmhs" (OuterVolumeSpecName: "kube-api-access-5pmhs") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "kube-api-access-5pmhs". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 01:49:53.893046 kubelet[2533]: I1213 01:49:53.892993 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-net-dir" (OuterVolumeSpecName: "cni-net-dir") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "cni-net-dir". PluginName "kubernetes.io/host-path", VolumeGidValue "" Dec 13 01:49:53.900539 kernel: audit: type=1327 audit(1734054593.833:1344): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:53.900872 kubelet[2533]: I1213 01:49:53.900846 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-node-certs" (OuterVolumeSpecName: "node-certs") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "node-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 01:49:53.901939 kubelet[2533]: I1213 01:49:53.901913 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "fe6e7cab-4f1d-4514-855e-fce60d7b4f06" (UID: "fe6e7cab-4f1d-4514-855e-fce60d7b4f06"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 01:49:53.903983 kubelet[2533]: I1213 01:49:53.903949 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "14ecfa96-b557-4ab3-9583-f36c9e3aad8a" (UID: "14ecfa96-b557-4ab3-9583-f36c9e3aad8a"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 01:49:53.904338 kubelet[2533]: I1213 01:49:53.904317 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/secret/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-typha-certs" (OuterVolumeSpecName: "typha-certs") pod "fe6e7cab-4f1d-4514-855e-fce60d7b4f06" (UID: "fe6e7cab-4f1d-4514-855e-fce60d7b4f06"). InnerVolumeSpecName "typha-certs". PluginName "kubernetes.io/secret", VolumeGidValue "" Dec 13 01:49:53.870000 audit[5205]: NETFILTER_CFG table=nat:127 family=2 entries=27 op=nft_unregister_chain pid=5205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:53.916473 kernel: audit: type=1325 audit(1734054593.870:1345): table=nat:127 family=2 entries=27 op=nft_unregister_chain pid=5205 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:53.916729 kubelet[2533]: I1213 01:49:53.916696 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-kube-api-access-t548f" (OuterVolumeSpecName: "kube-api-access-t548f") pod "fe6e7cab-4f1d-4514-855e-fce60d7b4f06" (UID: "fe6e7cab-4f1d-4514-855e-fce60d7b4f06"). InnerVolumeSpecName "kube-api-access-t548f". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 01:49:53.870000 audit[5205]: SYSCALL arch=c000003e syscall=46 success=yes exit=6028 a0=3 a1=7ffe27510e60 a2=0 a3=7ffe27510e4c items=0 ppid=2710 pid=5205 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:53.870000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:53.957911 kubelet[2533]: I1213 01:49:53.957864 2533 reconciler_common.go:300] "Volume detached for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-log-dir\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.957911 kubelet[2533]: I1213 01:49:53.957912 2533 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-tigera-ca-bundle\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958218 kubelet[2533]: I1213 01:49:53.957927 2533 reconciler_common.go:300] "Volume detached for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-net-dir\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958218 kubelet[2533]: I1213 01:49:53.957941 2533 reconciler_common.go:300] "Volume detached for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-var-lib-calico\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958218 kubelet[2533]: I1213 01:49:53.957954 2533 reconciler_common.go:300] "Volume detached for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-lib-modules\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958218 kubelet[2533]: I1213 01:49:53.957968 2533 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-5pmhs\" (UniqueName: \"kubernetes.io/projected/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-kube-api-access-5pmhs\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958218 kubelet[2533]: I1213 01:49:53.957979 2533 reconciler_common.go:300] "Volume detached for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-var-run-calico\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958218 kubelet[2533]: I1213 01:49:53.957996 2533 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-tigera-ca-bundle\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958218 kubelet[2533]: I1213 01:49:53.958009 2533 reconciler_common.go:300] "Volume detached for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-typha-certs\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958218 kubelet[2533]: I1213 01:49:53.958023 2533 reconciler_common.go:300] "Volume detached for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-xtables-lock\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958490 kubelet[2533]: I1213 01:49:53.958036 2533 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-t548f\" (UniqueName: \"kubernetes.io/projected/fe6e7cab-4f1d-4514-855e-fce60d7b4f06-kube-api-access-t548f\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958490 kubelet[2533]: I1213 01:49:53.958049 2533 reconciler_common.go:300] "Volume detached for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-node-certs\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958490 kubelet[2533]: I1213 01:49:53.958063 2533 reconciler_common.go:300] "Volume detached for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-flexvol-driver-host\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.958490 kubelet[2533]: I1213 01:49:53.958076 2533 reconciler_common.go:300] "Volume detached for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/14ecfa96-b557-4ab3-9583-f36c9e3aad8a-cni-bin-dir\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.848 [INFO][5199] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.848 [INFO][5199] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" iface="eth0" netns="/var/run/netns/cni-cdd38caf-4979-f917-78bb-f1dd5fd81b21" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.848 [INFO][5199] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" iface="eth0" netns="/var/run/netns/cni-cdd38caf-4979-f917-78bb-f1dd5fd81b21" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.885 [INFO][5199] cni-plugin/dataplane_linux.go 604: Deleted device in netns. ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" after=33.596505ms iface="eth0" netns="/var/run/netns/cni-cdd38caf-4979-f917-78bb-f1dd5fd81b21" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.885 [INFO][5199] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.885 [INFO][5199] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.929 [INFO][5215] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" HandleID="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.929 [INFO][5215] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.929 [INFO][5215] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.961 [INFO][5215] ipam/ipam_plugin.go 431: Released address using handleID ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" HandleID="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.961 [INFO][5215] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" HandleID="k8s-pod-network.1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.962 [INFO][5215] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:53.965474 env[1410]: 2024-12-13 01:49:53.963 [INFO][5199] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837" Dec 13 01:49:53.966553 env[1410]: time="2024-12-13T01:49:53.965700198Z" level=info msg="TearDown network for sandbox \"1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837\" successfully" Dec 13 01:49:53.966553 env[1410]: time="2024-12-13T01:49:53.965743398Z" level=info msg="StopPodSandbox for \"1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837\" returns successfully" Dec 13 01:49:53.966553 env[1410]: time="2024-12-13T01:49:53.966323700Z" level=info msg="StopPodSandbox for \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\"" Dec 13 01:49:54.030150 systemd[1]: Removed slice kubepods-besteffort-podfe6e7cab_4f1d_4514_855e_fce60d7b4f06.slice. Dec 13 01:49:54.036330 systemd[1]: Removed slice kubepods-besteffort-pod14ecfa96_b557_4ab3_9583_f36c9e3aad8a.slice. Dec 13 01:49:54.036472 systemd[1]: kubepods-besteffort-pod14ecfa96_b557_4ab3_9583_f36c9e3aad8a.slice: Consumed 2.186s CPU time. Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.001 [WARNING][5235] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0", GenerateName:"calico-kube-controllers-6f89f797c7-", Namespace:"calico-system", SelfLink:"", UID:"112d8bcc-2a50-44f8-a52e-cc27175b500a", ResourceVersion:"1038", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 48, 47, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"6f89f797c7", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-04a43feb01", ContainerID:"1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837", Pod:"calico-kube-controllers-6f89f797c7-8wmvk", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"cali5d7b4f94bab", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.002 [INFO][5235] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.002 [INFO][5235] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" iface="eth0" netns="" Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.002 [INFO][5235] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.002 [INFO][5235] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.025 [INFO][5241] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" HandleID="k8s-pod-network.92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.025 [INFO][5241] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.025 [INFO][5241] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.033 [WARNING][5241] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" HandleID="k8s-pod-network.92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.033 [INFO][5241] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" HandleID="k8s-pod-network.92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Workload="ci--3510.3.6--a--04a43feb01-k8s-calico--kube--controllers--6f89f797c7--8wmvk-eth0" Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.035 [INFO][5241] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:49:54.038793 env[1410]: 2024-12-13 01:49:54.036 [INFO][5235] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b" Dec 13 01:49:54.039385 env[1410]: time="2024-12-13T01:49:54.039336627Z" level=info msg="TearDown network for sandbox \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\" successfully" Dec 13 01:49:54.039385 env[1410]: time="2024-12-13T01:49:54.039375627Z" level=info msg="StopPodSandbox for \"92e0f6de04e8f909305be96bf0560f254998f8b37b8aa6826291bdb2e997c34b\" returns successfully" Dec 13 01:49:54.069264 env[1410]: time="2024-12-13T01:49:54.069215519Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bpvq5,Uid:da793b9f-011b-4469-b5d1-3693c55a2ce7,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:54.144499 env[1410]: time="2024-12-13T01:49:54.142335746Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:54.144715 env[1410]: time="2024-12-13T01:49:54.142372146Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:54.144715 env[1410]: time="2024-12-13T01:49:54.142385646Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:54.144865 env[1410]: time="2024-12-13T01:49:54.144690354Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/62236024e2bb1ea0758252c35f09fd8a5b07b3ad8413ff1f0abb08882427f047 pid=5254 runtime=io.containerd.runc.v2 Dec 13 01:49:54.158932 systemd[1]: Started cri-containerd-62236024e2bb1ea0758252c35f09fd8a5b07b3ad8413ff1f0abb08882427f047.scope. Dec 13 01:49:54.162010 kubelet[2533]: I1213 01:49:54.160470 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/112d8bcc-2a50-44f8-a52e-cc27175b500a-tigera-ca-bundle\") pod \"112d8bcc-2a50-44f8-a52e-cc27175b500a\" (UID: \"112d8bcc-2a50-44f8-a52e-cc27175b500a\") " Dec 13 01:49:54.162010 kubelet[2533]: I1213 01:49:54.160599 2533 reconciler_common.go:172] "operationExecutor.UnmountVolume started for volume \"kube-api-access-xnb6t\" (UniqueName: \"kubernetes.io/projected/112d8bcc-2a50-44f8-a52e-cc27175b500a-kube-api-access-xnb6t\") pod \"112d8bcc-2a50-44f8-a52e-cc27175b500a\" (UID: \"112d8bcc-2a50-44f8-a52e-cc27175b500a\") " Dec 13 01:49:54.166834 kubelet[2533]: I1213 01:49:54.166798 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/projected/112d8bcc-2a50-44f8-a52e-cc27175b500a-kube-api-access-xnb6t" (OuterVolumeSpecName: "kube-api-access-xnb6t") pod "112d8bcc-2a50-44f8-a52e-cc27175b500a" (UID: "112d8bcc-2a50-44f8-a52e-cc27175b500a"). InnerVolumeSpecName "kube-api-access-xnb6t". PluginName "kubernetes.io/projected", VolumeGidValue "" Dec 13 01:49:54.169180 kubelet[2533]: I1213 01:49:54.169144 2533 operation_generator.go:887] UnmountVolume.TearDown succeeded for volume "kubernetes.io/configmap/112d8bcc-2a50-44f8-a52e-cc27175b500a-tigera-ca-bundle" (OuterVolumeSpecName: "tigera-ca-bundle") pod "112d8bcc-2a50-44f8-a52e-cc27175b500a" (UID: "112d8bcc-2a50-44f8-a52e-cc27175b500a"). InnerVolumeSpecName "tigera-ca-bundle". PluginName "kubernetes.io/configmap", VolumeGidValue "" Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.178000 audit: BPF prog-id=212 op=LOAD Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=5254 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323336303234653262623165613037353832353263333566303966 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=5254 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323336303234653262623165613037353832353263333566303966 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit: BPF prog-id=213 op=LOAD Dec 13 01:49:54.179000 audit[5264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003b82e0 items=0 ppid=5254 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323336303234653262623165613037353832353263333566303966 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit: BPF prog-id=214 op=LOAD Dec 13 01:49:54.179000 audit[5264]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003b8328 items=0 ppid=5254 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323336303234653262623165613037353832353263333566303966 Dec 13 01:49:54.179000 audit: BPF prog-id=214 op=UNLOAD Dec 13 01:49:54.179000 audit: BPF prog-id=213 op=UNLOAD Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { perfmon } for pid=5264 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit[5264]: AVC avc: denied { bpf } for pid=5264 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.179000 audit: BPF prog-id=215 op=LOAD Dec 13 01:49:54.179000 audit[5264]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003b8738 items=0 ppid=5254 pid=5264 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.179000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3632323336303234653262623165613037353832353263333566303966 Dec 13 01:49:54.193013 env[1410]: time="2024-12-13T01:49:54.192962103Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-bpvq5,Uid:da793b9f-011b-4469-b5d1-3693c55a2ce7,Namespace:calico-system,Attempt:0,} returns sandbox id \"62236024e2bb1ea0758252c35f09fd8a5b07b3ad8413ff1f0abb08882427f047\"" Dec 13 01:49:54.197494 env[1410]: time="2024-12-13T01:49:54.197441617Z" level=info msg="CreateContainer within sandbox \"62236024e2bb1ea0758252c35f09fd8a5b07b3ad8413ff1f0abb08882427f047\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 01:49:54.244514 env[1410]: time="2024-12-13T01:49:54.244426163Z" level=info msg="CreateContainer within sandbox \"62236024e2bb1ea0758252c35f09fd8a5b07b3ad8413ff1f0abb08882427f047\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"2c6085e0fd0d00f224565361d49da89ba015094e5a87f015a240004f8e96815a\"" Dec 13 01:49:54.246505 env[1410]: time="2024-12-13T01:49:54.245250666Z" level=info msg="StartContainer for \"2c6085e0fd0d00f224565361d49da89ba015094e5a87f015a240004f8e96815a\"" Dec 13 01:49:54.261533 kubelet[2533]: I1213 01:49:54.261498 2533 reconciler_common.go:300] "Volume detached for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/112d8bcc-2a50-44f8-a52e-cc27175b500a-tigera-ca-bundle\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:54.261701 kubelet[2533]: I1213 01:49:54.261551 2533 reconciler_common.go:300] "Volume detached for volume \"kube-api-access-xnb6t\" (UniqueName: \"kubernetes.io/projected/112d8bcc-2a50-44f8-a52e-cc27175b500a-kube-api-access-xnb6t\") on node \"ci-3510.3.6-a-04a43feb01\" DevicePath \"\"" Dec 13 01:49:54.264306 systemd[1]: Started cri-containerd-2c6085e0fd0d00f224565361d49da89ba015094e5a87f015a240004f8e96815a.scope. Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f156019fa28 items=0 ppid=5254 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263363038356530666430643030663232343536353336316434396461 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit: BPF prog-id=216 op=LOAD Dec 13 01:49:54.282000 audit[5297]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a71b8 items=0 ppid=5254 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263363038356530666430643030663232343536353336316434396461 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit: BPF prog-id=217 op=LOAD Dec 13 01:49:54.282000 audit[5297]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0000a7208 items=0 ppid=5254 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263363038356530666430643030663232343536353336316434396461 Dec 13 01:49:54.282000 audit: BPF prog-id=217 op=UNLOAD Dec 13 01:49:54.282000 audit: BPF prog-id=216 op=UNLOAD Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { perfmon } for pid=5297 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit[5297]: AVC avc: denied { bpf } for pid=5297 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:54.282000 audit: BPF prog-id=218 op=LOAD Dec 13 01:49:54.282000 audit[5297]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0000a7298 items=0 ppid=5254 pid=5297 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:54.282000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263363038356530666430643030663232343536353336316434396461 Dec 13 01:49:54.301305 env[1410]: time="2024-12-13T01:49:54.301186539Z" level=info msg="StartContainer for \"2c6085e0fd0d00f224565361d49da89ba015094e5a87f015a240004f8e96815a\" returns successfully" Dec 13 01:49:54.312757 systemd[1]: cri-containerd-2c6085e0fd0d00f224565361d49da89ba015094e5a87f015a240004f8e96815a.scope: Deactivated successfully. Dec 13 01:49:54.316000 audit: BPF prog-id=218 op=UNLOAD Dec 13 01:49:54.362465 kubelet[2533]: I1213 01:49:54.361953 2533 scope.go:117] "RemoveContainer" containerID="5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266" Dec 13 01:49:54.368302 env[1410]: time="2024-12-13T01:49:54.368258347Z" level=info msg="RemoveContainer for \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\"" Dec 13 01:49:54.388556 systemd[1]: Removed slice kubepods-besteffort-pod112d8bcc_2a50_44f8_a52e_cc27175b500a.slice. Dec 13 01:49:54.441845 env[1410]: time="2024-12-13T01:49:54.441723875Z" level=info msg="RemoveContainer for \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\" returns successfully" Dec 13 01:49:54.444819 env[1410]: time="2024-12-13T01:49:54.444768384Z" level=info msg="shim disconnected" id=2c6085e0fd0d00f224565361d49da89ba015094e5a87f015a240004f8e96815a Dec 13 01:49:54.445044 kubelet[2533]: I1213 01:49:54.444961 2533 scope.go:117] "RemoveContainer" containerID="5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266" Dec 13 01:49:54.445380 env[1410]: time="2024-12-13T01:49:54.445197886Z" level=warning msg="cleaning up after shim disconnected" id=2c6085e0fd0d00f224565361d49da89ba015094e5a87f015a240004f8e96815a namespace=k8s.io Dec 13 01:49:54.445380 env[1410]: time="2024-12-13T01:49:54.445222486Z" level=info msg="cleaning up dead shim" Dec 13 01:49:54.446062 env[1410]: time="2024-12-13T01:49:54.445329386Z" level=error msg="ContainerStatus for \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\": not found" Dec 13 01:49:54.446388 kubelet[2533]: E1213 01:49:54.446363 2533 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\": not found" containerID="5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266" Dec 13 01:49:54.446513 kubelet[2533]: I1213 01:49:54.446417 2533 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266"} err="failed to get container status \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\": rpc error: code = NotFound desc = an error occurred when try to find container \"5faa1df937ee4b42f0cef57686bfa50867c9cde2324af7847cb31b5a4df32266\": not found" Dec 13 01:49:54.446513 kubelet[2533]: I1213 01:49:54.446466 2533 scope.go:117] "RemoveContainer" containerID="c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d" Dec 13 01:49:54.451411 env[1410]: time="2024-12-13T01:49:54.451369305Z" level=info msg="RemoveContainer for \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\"" Dec 13 01:49:54.479101 env[1410]: time="2024-12-13T01:49:54.479052291Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:54Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=5336 runtime=io.containerd.runc.v2\n" Dec 13 01:49:54.486000 env[1410]: time="2024-12-13T01:49:54.485950612Z" level=info msg="RemoveContainer for \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\" returns successfully" Dec 13 01:49:54.487738 kubelet[2533]: I1213 01:49:54.486229 2533 scope.go:117] "RemoveContainer" containerID="3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8" Dec 13 01:49:54.489488 env[1410]: time="2024-12-13T01:49:54.489431923Z" level=info msg="RemoveContainer for \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\"" Dec 13 01:49:54.517120 env[1410]: time="2024-12-13T01:49:54.517068809Z" level=info msg="RemoveContainer for \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\" returns successfully" Dec 13 01:49:54.517358 kubelet[2533]: I1213 01:49:54.517330 2533 scope.go:117] "RemoveContainer" containerID="b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5" Dec 13 01:49:54.518418 env[1410]: time="2024-12-13T01:49:54.518385513Z" level=info msg="RemoveContainer for \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\"" Dec 13 01:49:54.532637 env[1410]: time="2024-12-13T01:49:54.532595557Z" level=info msg="RemoveContainer for \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\" returns successfully" Dec 13 01:49:54.532832 kubelet[2533]: I1213 01:49:54.532806 2533 scope.go:117] "RemoveContainer" containerID="c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d" Dec 13 01:49:54.533219 env[1410]: time="2024-12-13T01:49:54.533157259Z" level=error msg="ContainerStatus for \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\": not found" Dec 13 01:49:54.533373 kubelet[2533]: E1213 01:49:54.533353 2533 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\": not found" containerID="c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d" Dec 13 01:49:54.533471 kubelet[2533]: I1213 01:49:54.533401 2533 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d"} err="failed to get container status \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\": rpc error: code = NotFound desc = an error occurred when try to find container \"c57b185e21766eca2e36249b383418e40eabcf642427abeca995ec75af1f2e4d\": not found" Dec 13 01:49:54.533471 kubelet[2533]: I1213 01:49:54.533417 2533 scope.go:117] "RemoveContainer" containerID="3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8" Dec 13 01:49:54.533680 env[1410]: time="2024-12-13T01:49:54.533621360Z" level=error msg="ContainerStatus for \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\": not found" Dec 13 01:49:54.533804 kubelet[2533]: E1213 01:49:54.533781 2533 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\": not found" containerID="3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8" Dec 13 01:49:54.533883 kubelet[2533]: I1213 01:49:54.533819 2533 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8"} err="failed to get container status \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\": rpc error: code = NotFound desc = an error occurred when try to find container \"3c6d59d64a71b269daa19d89f0037eb6e95626a73fa4c3ac4723d0bbd648dbc8\": not found" Dec 13 01:49:54.533883 kubelet[2533]: I1213 01:49:54.533832 2533 scope.go:117] "RemoveContainer" containerID="b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5" Dec 13 01:49:54.534103 env[1410]: time="2024-12-13T01:49:54.534060061Z" level=error msg="ContainerStatus for \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\": not found" Dec 13 01:49:54.534257 kubelet[2533]: E1213 01:49:54.534212 2533 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\": not found" containerID="b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5" Dec 13 01:49:54.534338 kubelet[2533]: I1213 01:49:54.534272 2533 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5"} err="failed to get container status \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\": rpc error: code = NotFound desc = an error occurred when try to find container \"b49dc186f32de2449225f269112f2960e79efa7b5736da174979af3686c771a5\": not found" Dec 13 01:49:54.534338 kubelet[2533]: I1213 01:49:54.534290 2533 scope.go:117] "RemoveContainer" containerID="bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a" Dec 13 01:49:54.535528 env[1410]: time="2024-12-13T01:49:54.535501066Z" level=info msg="RemoveContainer for \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\"" Dec 13 01:49:54.546499 env[1410]: time="2024-12-13T01:49:54.546402900Z" level=info msg="RemoveContainer for \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\" returns successfully" Dec 13 01:49:54.546684 kubelet[2533]: I1213 01:49:54.546662 2533 scope.go:117] "RemoveContainer" containerID="bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a" Dec 13 01:49:54.547012 env[1410]: time="2024-12-13T01:49:54.546957001Z" level=error msg="ContainerStatus for \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\" failed" error="rpc error: code = NotFound desc = an error occurred when try to find container \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\": not found" Dec 13 01:49:54.547249 kubelet[2533]: E1213 01:49:54.547219 2533 remote_runtime.go:432] "ContainerStatus from runtime service failed" err="rpc error: code = NotFound desc = an error occurred when try to find container \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\": not found" containerID="bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a" Dec 13 01:49:54.547321 kubelet[2533]: I1213 01:49:54.547258 2533 pod_container_deletor.go:53] "DeleteContainer returned error" containerID={"Type":"containerd","ID":"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a"} err="failed to get container status \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\": rpc error: code = NotFound desc = an error occurred when try to find container \"bc73f17643e2183f721b91bbd9cd760466b417f2ec069e5984773122e323667a\": not found" Dec 13 01:49:54.587976 systemd[1]: var-lib-kubelet-pods-112d8bcc\x2d2a50\x2d44f8\x2da52e\x2dcc27175b500a-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dkube\x2dcontrollers-1.mount: Deactivated successfully. Dec 13 01:49:54.588103 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-1ebbe8c29f9fce324ec33ebbce1cff4d6f6a4e92ca2f7e8d351ea41c12122837-rootfs.mount: Deactivated successfully. Dec 13 01:49:54.588181 systemd[1]: run-netns-cni\x2dcdd38caf\x2d4979\x2df917\x2d78bb\x2df1dd5fd81b21.mount: Deactivated successfully. Dec 13 01:49:54.588255 systemd[1]: var-lib-kubelet-pods-14ecfa96\x2db557\x2d4ab3\x2d9583\x2df36c9e3aad8a-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dnode-1.mount: Deactivated successfully. Dec 13 01:49:54.588334 systemd[1]: var-lib-kubelet-pods-112d8bcc\x2d2a50\x2d44f8\x2da52e\x2dcc27175b500a-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dxnb6t.mount: Deactivated successfully. Dec 13 01:49:54.588408 systemd[1]: var-lib-kubelet-pods-fe6e7cab\x2d4f1d\x2d4514\x2d855e\x2dfce60d7b4f06-volume\x2dsubpaths-tigera\x2dca\x2dbundle-calico\x2dtypha-1.mount: Deactivated successfully. Dec 13 01:49:54.589255 systemd[1]: var-lib-kubelet-pods-14ecfa96\x2db557\x2d4ab3\x2d9583\x2df36c9e3aad8a-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2d5pmhs.mount: Deactivated successfully. Dec 13 01:49:54.589360 systemd[1]: var-lib-kubelet-pods-14ecfa96\x2db557\x2d4ab3\x2d9583\x2df36c9e3aad8a-volumes-kubernetes.io\x7esecret-node\x2dcerts.mount: Deactivated successfully. Dec 13 01:49:54.589439 systemd[1]: var-lib-kubelet-pods-fe6e7cab\x2d4f1d\x2d4514\x2d855e\x2dfce60d7b4f06-volumes-kubernetes.io\x7eprojected-kube\x2dapi\x2daccess\x2dt548f.mount: Deactivated successfully. Dec 13 01:49:54.589569 systemd[1]: var-lib-kubelet-pods-fe6e7cab\x2d4f1d\x2d4514\x2d855e\x2dfce60d7b4f06-volumes-kubernetes.io\x7esecret-typha\x2dcerts.mount: Deactivated successfully.