Dec 13 01:46:51.046620 kernel: Linux version 5.15.173-flatcar (build@pony-truck.infra.kinvolk.io) (x86_64-cros-linux-gnu-gcc (Gentoo Hardened 11.3.1_p20221209 p3) 11.3.1 20221209, GNU ld (Gentoo 2.39 p5) 2.39.0) #1 SMP Thu Dec 12 23:50:37 -00 2024 Dec 13 01:46:51.046651 kernel: Command line: BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:46:51.046665 kernel: BIOS-provided physical RAM map: Dec 13 01:46:51.046676 kernel: BIOS-e820: [mem 0x0000000000000000-0x000000000009ffff] usable Dec 13 01:46:51.046686 kernel: BIOS-e820: [mem 0x00000000000c0000-0x00000000000fffff] reserved Dec 13 01:46:51.046696 kernel: BIOS-e820: [mem 0x0000000000100000-0x000000003ff40fff] usable Dec 13 01:46:51.046710 kernel: BIOS-e820: [mem 0x000000003ff41000-0x000000003ffc8fff] reserved Dec 13 01:46:51.046721 kernel: BIOS-e820: [mem 0x000000003ffc9000-0x000000003fffafff] ACPI data Dec 13 01:46:51.046732 kernel: BIOS-e820: [mem 0x000000003fffb000-0x000000003fffefff] ACPI NVS Dec 13 01:46:51.046742 kernel: BIOS-e820: [mem 0x000000003ffff000-0x000000003fffffff] usable Dec 13 01:46:51.046753 kernel: BIOS-e820: [mem 0x0000000100000000-0x00000002bfffffff] usable Dec 13 01:46:51.046763 kernel: printk: bootconsole [earlyser0] enabled Dec 13 01:46:51.046773 kernel: NX (Execute Disable) protection: active Dec 13 01:46:51.046784 kernel: efi: EFI v2.70 by Microsoft Dec 13 01:46:51.046800 kernel: efi: ACPI=0x3fffa000 ACPI 2.0=0x3fffa014 SMBIOS=0x3ff85000 SMBIOS 3.0=0x3ff83000 MEMATTR=0x3f5c8a98 RNG=0x3ffd1018 Dec 13 01:46:51.046812 kernel: random: crng init done Dec 13 01:46:51.046823 kernel: SMBIOS 3.1.0 present. Dec 13 01:46:51.046835 kernel: DMI: Microsoft Corporation Virtual Machine/Virtual Machine, BIOS Hyper-V UEFI Release v4.1 03/08/2024 Dec 13 01:46:51.046846 kernel: Hypervisor detected: Microsoft Hyper-V Dec 13 01:46:51.046857 kernel: Hyper-V: privilege flags low 0x2e7f, high 0x3b8030, hints 0x64e24, misc 0xbed7b2 Dec 13 01:46:51.046869 kernel: Hyper-V Host Build:20348-10.0-1-0.1633 Dec 13 01:46:51.046880 kernel: Hyper-V: Nested features: 0x1e0101 Dec 13 01:46:51.046894 kernel: Hyper-V: LAPIC Timer Frequency: 0x30d40 Dec 13 01:46:51.046905 kernel: Hyper-V: Using hypercall for remote TLB flush Dec 13 01:46:51.046916 kernel: clocksource: hyperv_clocksource_tsc_page: mask: 0xffffffffffffffff max_cycles: 0x24e6a1710, max_idle_ns: 440795202120 ns Dec 13 01:46:51.046928 kernel: tsc: Marking TSC unstable due to running on Hyper-V Dec 13 01:46:51.046940 kernel: tsc: Detected 2593.906 MHz processor Dec 13 01:46:51.046952 kernel: e820: update [mem 0x00000000-0x00000fff] usable ==> reserved Dec 13 01:46:51.046964 kernel: e820: remove [mem 0x000a0000-0x000fffff] usable Dec 13 01:46:51.046975 kernel: last_pfn = 0x2c0000 max_arch_pfn = 0x400000000 Dec 13 01:46:51.046987 kernel: x86/PAT: Configuration [0-7]: WB WC UC- UC WB WP UC- WT Dec 13 01:46:51.046999 kernel: e820: update [mem 0x40000000-0xffffffff] usable ==> reserved Dec 13 01:46:51.047013 kernel: last_pfn = 0x40000 max_arch_pfn = 0x400000000 Dec 13 01:46:51.047024 kernel: Using GB pages for direct mapping Dec 13 01:46:51.047036 kernel: Secure boot disabled Dec 13 01:46:51.047047 kernel: ACPI: Early table checksum verification disabled Dec 13 01:46:51.047059 kernel: ACPI: RSDP 0x000000003FFFA014 000024 (v02 VRTUAL) Dec 13 01:46:51.047070 kernel: ACPI: XSDT 0x000000003FFF90E8 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:51.047082 kernel: ACPI: FACP 0x000000003FFF8000 000114 (v06 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:51.047094 kernel: ACPI: DSDT 0x000000003FFD6000 01E184 (v02 MSFTVM DSDT01 00000001 MSFT 05000000) Dec 13 01:46:51.047113 kernel: ACPI: FACS 0x000000003FFFE000 000040 Dec 13 01:46:51.047125 kernel: ACPI: OEM0 0x000000003FFF7000 000064 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:51.047137 kernel: ACPI: SPCR 0x000000003FFF6000 000050 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:51.047150 kernel: ACPI: WAET 0x000000003FFF5000 000028 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:51.047163 kernel: ACPI: APIC 0x000000003FFD5000 000058 (v04 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:51.047176 kernel: ACPI: SRAT 0x000000003FFD4000 0002D0 (v02 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:51.047190 kernel: ACPI: BGRT 0x000000003FFD3000 000038 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:51.047203 kernel: ACPI: FPDT 0x000000003FFD2000 000034 (v01 VRTUAL MICROSFT 00000001 MSFT 00000001) Dec 13 01:46:51.047216 kernel: ACPI: Reserving FACP table memory at [mem 0x3fff8000-0x3fff8113] Dec 13 01:46:51.047228 kernel: ACPI: Reserving DSDT table memory at [mem 0x3ffd6000-0x3fff4183] Dec 13 01:46:51.047241 kernel: ACPI: Reserving FACS table memory at [mem 0x3fffe000-0x3fffe03f] Dec 13 01:46:51.047253 kernel: ACPI: Reserving OEM0 table memory at [mem 0x3fff7000-0x3fff7063] Dec 13 01:46:51.047266 kernel: ACPI: Reserving SPCR table memory at [mem 0x3fff6000-0x3fff604f] Dec 13 01:46:51.047278 kernel: ACPI: Reserving WAET table memory at [mem 0x3fff5000-0x3fff5027] Dec 13 01:46:51.047293 kernel: ACPI: Reserving APIC table memory at [mem 0x3ffd5000-0x3ffd5057] Dec 13 01:46:51.047306 kernel: ACPI: Reserving SRAT table memory at [mem 0x3ffd4000-0x3ffd42cf] Dec 13 01:46:51.047319 kernel: ACPI: Reserving BGRT table memory at [mem 0x3ffd3000-0x3ffd3037] Dec 13 01:46:51.047331 kernel: ACPI: Reserving FPDT table memory at [mem 0x3ffd2000-0x3ffd2033] Dec 13 01:46:51.047343 kernel: SRAT: PXM 0 -> APIC 0x00 -> Node 0 Dec 13 01:46:51.047356 kernel: SRAT: PXM 0 -> APIC 0x01 -> Node 0 Dec 13 01:46:51.047368 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x00000000-0x3fffffff] hotplug Dec 13 01:46:51.047381 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000-0x2bfffffff] hotplug Dec 13 01:46:51.047394 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2c0000000-0xfdfffffff] hotplug Dec 13 01:46:51.047409 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000-0xffffffffff] hotplug Dec 13 01:46:51.047421 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x10000000000-0x1ffffffffff] hotplug Dec 13 01:46:51.047434 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x20000000000-0x3ffffffffff] hotplug Dec 13 01:46:51.047446 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x40000000000-0x7ffffffffff] hotplug Dec 13 01:46:51.047459 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x80000000000-0xfffffffffff] hotplug Dec 13 01:46:51.047471 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x100000000000-0x1fffffffffff] hotplug Dec 13 01:46:51.047484 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x200000000000-0x3fffffffffff] hotplug Dec 13 01:46:51.047497 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x400000000000-0x7fffffffffff] hotplug Dec 13 01:46:51.047509 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x800000000000-0xffffffffffff] hotplug Dec 13 01:46:51.047524 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x1000000000000-0x1ffffffffffff] hotplug Dec 13 01:46:51.047561 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x2000000000000-0x3ffffffffffff] hotplug Dec 13 01:46:51.047574 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x4000000000000-0x7ffffffffffff] hotplug Dec 13 01:46:51.047587 kernel: ACPI: SRAT: Node 0 PXM 0 [mem 0x8000000000000-0xfffffffffffff] hotplug Dec 13 01:46:51.047599 kernel: NUMA: Node 0 [mem 0x00000000-0x3fffffff] + [mem 0x100000000-0x2bfffffff] -> [mem 0x00000000-0x2bfffffff] Dec 13 01:46:51.047612 kernel: NODE_DATA(0) allocated [mem 0x2bfffa000-0x2bfffffff] Dec 13 01:46:51.047625 kernel: Zone ranges: Dec 13 01:46:51.047637 kernel: DMA [mem 0x0000000000001000-0x0000000000ffffff] Dec 13 01:46:51.047650 kernel: DMA32 [mem 0x0000000001000000-0x00000000ffffffff] Dec 13 01:46:51.047665 kernel: Normal [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 01:46:51.047678 kernel: Movable zone start for each node Dec 13 01:46:51.047690 kernel: Early memory node ranges Dec 13 01:46:51.047703 kernel: node 0: [mem 0x0000000000001000-0x000000000009ffff] Dec 13 01:46:51.047715 kernel: node 0: [mem 0x0000000000100000-0x000000003ff40fff] Dec 13 01:46:51.047728 kernel: node 0: [mem 0x000000003ffff000-0x000000003fffffff] Dec 13 01:46:51.047740 kernel: node 0: [mem 0x0000000100000000-0x00000002bfffffff] Dec 13 01:46:51.047753 kernel: Initmem setup node 0 [mem 0x0000000000001000-0x00000002bfffffff] Dec 13 01:46:51.047765 kernel: On node 0, zone DMA: 1 pages in unavailable ranges Dec 13 01:46:51.047780 kernel: On node 0, zone DMA: 96 pages in unavailable ranges Dec 13 01:46:51.047792 kernel: On node 0, zone DMA32: 190 pages in unavailable ranges Dec 13 01:46:51.047805 kernel: ACPI: PM-Timer IO Port: 0x408 Dec 13 01:46:51.047817 kernel: ACPI: LAPIC_NMI (acpi_id[0x01] dfl dfl lint[0x1]) Dec 13 01:46:51.047830 kernel: IOAPIC[0]: apic_id 2, version 17, address 0xfec00000, GSI 0-23 Dec 13 01:46:51.047842 kernel: ACPI: INT_SRC_OVR (bus 0 bus_irq 9 global_irq 9 high level) Dec 13 01:46:51.047855 kernel: ACPI: Using ACPI (MADT) for SMP configuration information Dec 13 01:46:51.047867 kernel: ACPI: SPCR: console: uart,io,0x3f8,115200 Dec 13 01:46:51.047880 kernel: smpboot: Allowing 2 CPUs, 0 hotplug CPUs Dec 13 01:46:51.047895 kernel: [mem 0x40000000-0xffffffff] available for PCI devices Dec 13 01:46:51.047908 kernel: Booting paravirtualized kernel on Hyper-V Dec 13 01:46:51.047920 kernel: clocksource: refined-jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1910969940391419 ns Dec 13 01:46:51.047933 kernel: setup_percpu: NR_CPUS:512 nr_cpumask_bits:512 nr_cpu_ids:2 nr_node_ids:1 Dec 13 01:46:51.047946 kernel: percpu: Embedded 56 pages/cpu s188696 r8192 d32488 u1048576 Dec 13 01:46:51.047958 kernel: pcpu-alloc: s188696 r8192 d32488 u1048576 alloc=1*2097152 Dec 13 01:46:51.047970 kernel: pcpu-alloc: [0] 0 1 Dec 13 01:46:51.047983 kernel: Hyper-V: PV spinlocks enabled Dec 13 01:46:51.047995 kernel: PV qspinlock hash table entries: 256 (order: 0, 4096 bytes, linear) Dec 13 01:46:51.048010 kernel: Built 1 zonelists, mobility grouping on. Total pages: 2062618 Dec 13 01:46:51.048022 kernel: Policy zone: Normal Dec 13 01:46:51.048036 kernel: Kernel command line: rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:46:51.048049 kernel: Unknown kernel command line parameters "BOOT_IMAGE=/flatcar/vmlinuz-a", will be passed to user space. Dec 13 01:46:51.048061 kernel: Dentry cache hash table entries: 1048576 (order: 11, 8388608 bytes, linear) Dec 13 01:46:51.048073 kernel: Inode-cache hash table entries: 524288 (order: 10, 4194304 bytes, linear) Dec 13 01:46:51.048085 kernel: mem auto-init: stack:off, heap alloc:off, heap free:off Dec 13 01:46:51.048097 kernel: Memory: 8079144K/8387460K available (12294K kernel code, 2275K rwdata, 13716K rodata, 47476K init, 4108K bss, 308056K reserved, 0K cma-reserved) Dec 13 01:46:51.048112 kernel: SLUB: HWalign=64, Order=0-3, MinObjects=0, CPUs=2, Nodes=1 Dec 13 01:46:51.048125 kernel: ftrace: allocating 34549 entries in 135 pages Dec 13 01:46:51.048146 kernel: ftrace: allocated 135 pages with 4 groups Dec 13 01:46:51.048162 kernel: rcu: Hierarchical RCU implementation. Dec 13 01:46:51.048175 kernel: rcu: RCU event tracing is enabled. Dec 13 01:46:51.048188 kernel: rcu: RCU restricting CPUs from NR_CPUS=512 to nr_cpu_ids=2. Dec 13 01:46:51.048201 kernel: Rude variant of Tasks RCU enabled. Dec 13 01:46:51.048214 kernel: Tracing variant of Tasks RCU enabled. Dec 13 01:46:51.048227 kernel: rcu: RCU calculated value of scheduler-enlistment delay is 100 jiffies. Dec 13 01:46:51.048240 kernel: rcu: Adjusting geometry for rcu_fanout_leaf=16, nr_cpu_ids=2 Dec 13 01:46:51.048252 kernel: Using NULL legacy PIC Dec 13 01:46:51.048268 kernel: NR_IRQS: 33024, nr_irqs: 440, preallocated irqs: 0 Dec 13 01:46:51.048281 kernel: Console: colour dummy device 80x25 Dec 13 01:46:51.048293 kernel: printk: console [tty1] enabled Dec 13 01:46:51.048306 kernel: printk: console [ttyS0] enabled Dec 13 01:46:51.048319 kernel: printk: bootconsole [earlyser0] disabled Dec 13 01:46:51.048334 kernel: ACPI: Core revision 20210730 Dec 13 01:46:51.048347 kernel: Failed to register legacy timer interrupt Dec 13 01:46:51.048360 kernel: APIC: Switch to symmetric I/O mode setup Dec 13 01:46:51.048373 kernel: Hyper-V: Using IPI hypercalls Dec 13 01:46:51.048386 kernel: Calibrating delay loop (skipped), value calculated using timer frequency.. 5187.81 BogoMIPS (lpj=2593906) Dec 13 01:46:51.048399 kernel: Last level iTLB entries: 4KB 64, 2MB 8, 4MB 8 Dec 13 01:46:51.048412 kernel: Last level dTLB entries: 4KB 64, 2MB 0, 4MB 0, 1GB 4 Dec 13 01:46:51.048425 kernel: Spectre V1 : Mitigation: usercopy/swapgs barriers and __user pointer sanitization Dec 13 01:46:51.048437 kernel: Spectre V2 : Mitigation: Retpolines Dec 13 01:46:51.048450 kernel: Spectre V2 : Spectre v2 / SpectreRSB mitigation: Filling RSB on context switch Dec 13 01:46:51.048465 kernel: Spectre V2 : Spectre v2 / SpectreRSB : Filling RSB on VMEXIT Dec 13 01:46:51.048478 kernel: RETBleed: WARNING: Spectre v2 mitigation leaves CPU vulnerable to RETBleed attacks, data leaks possible! Dec 13 01:46:51.048490 kernel: RETBleed: Vulnerable Dec 13 01:46:51.048503 kernel: Speculative Store Bypass: Vulnerable Dec 13 01:46:51.048515 kernel: TAA: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 01:46:51.048528 kernel: MMIO Stale Data: Vulnerable: Clear CPU buffers attempted, no microcode Dec 13 01:46:51.051580 kernel: GDS: Unknown: Dependent on hypervisor status Dec 13 01:46:51.051600 kernel: x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' Dec 13 01:46:51.051614 kernel: x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' Dec 13 01:46:51.051628 kernel: x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' Dec 13 01:46:51.051646 kernel: x86/fpu: Supporting XSAVE feature 0x020: 'AVX-512 opmask' Dec 13 01:46:51.051659 kernel: x86/fpu: Supporting XSAVE feature 0x040: 'AVX-512 Hi256' Dec 13 01:46:51.051672 kernel: x86/fpu: Supporting XSAVE feature 0x080: 'AVX-512 ZMM_Hi256' Dec 13 01:46:51.051685 kernel: x86/fpu: xstate_offset[2]: 576, xstate_sizes[2]: 256 Dec 13 01:46:51.051699 kernel: x86/fpu: xstate_offset[5]: 832, xstate_sizes[5]: 64 Dec 13 01:46:51.051712 kernel: x86/fpu: xstate_offset[6]: 896, xstate_sizes[6]: 512 Dec 13 01:46:51.051726 kernel: x86/fpu: xstate_offset[7]: 1408, xstate_sizes[7]: 1024 Dec 13 01:46:51.051739 kernel: x86/fpu: Enabled xstate features 0xe7, context size is 2432 bytes, using 'compacted' format. Dec 13 01:46:51.051752 kernel: Freeing SMP alternatives memory: 32K Dec 13 01:46:51.051765 kernel: pid_max: default: 32768 minimum: 301 Dec 13 01:46:51.051779 kernel: LSM: Security Framework initializing Dec 13 01:46:51.051792 kernel: SELinux: Initializing. Dec 13 01:46:51.051808 kernel: Mount-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 01:46:51.051822 kernel: Mountpoint-cache hash table entries: 16384 (order: 5, 131072 bytes, linear) Dec 13 01:46:51.051835 kernel: smpboot: CPU0: Intel(R) Xeon(R) Platinum 8272CL CPU @ 2.60GHz (family: 0x6, model: 0x55, stepping: 0x7) Dec 13 01:46:51.051849 kernel: Performance Events: unsupported p6 CPU model 85 no PMU driver, software events only. Dec 13 01:46:51.051863 kernel: signal: max sigframe size: 3632 Dec 13 01:46:51.051877 kernel: rcu: Hierarchical SRCU implementation. Dec 13 01:46:51.051891 kernel: NMI watchdog: Perf NMI watchdog permanently disabled Dec 13 01:46:51.051904 kernel: smp: Bringing up secondary CPUs ... Dec 13 01:46:51.051918 kernel: x86: Booting SMP configuration: Dec 13 01:46:51.051931 kernel: .... node #0, CPUs: #1 Dec 13 01:46:51.051948 kernel: TAA CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/tsx_async_abort.html for more details. Dec 13 01:46:51.051962 kernel: MMIO Stale Data CPU bug present and SMT on, data leak possible. See https://www.kernel.org/doc/html/latest/admin-guide/hw-vuln/processor_mmio_stale_data.html for more details. Dec 13 01:46:51.051975 kernel: smp: Brought up 1 node, 2 CPUs Dec 13 01:46:51.051989 kernel: smpboot: Max logical packages: 1 Dec 13 01:46:51.052002 kernel: smpboot: Total of 2 processors activated (10375.62 BogoMIPS) Dec 13 01:46:51.052016 kernel: devtmpfs: initialized Dec 13 01:46:51.052029 kernel: x86/mm: Memory block size: 128MB Dec 13 01:46:51.052043 kernel: ACPI: PM: Registering ACPI NVS region [mem 0x3fffb000-0x3fffefff] (16384 bytes) Dec 13 01:46:51.052060 kernel: clocksource: jiffies: mask: 0xffffffff max_cycles: 0xffffffff, max_idle_ns: 1911260446275000 ns Dec 13 01:46:51.052073 kernel: futex hash table entries: 512 (order: 3, 32768 bytes, linear) Dec 13 01:46:51.052087 kernel: pinctrl core: initialized pinctrl subsystem Dec 13 01:46:51.052100 kernel: NET: Registered PF_NETLINK/PF_ROUTE protocol family Dec 13 01:46:51.052114 kernel: audit: initializing netlink subsys (disabled) Dec 13 01:46:51.052127 kernel: audit: type=2000 audit(1734054409.026:1): state=initialized audit_enabled=0 res=1 Dec 13 01:46:51.052140 kernel: thermal_sys: Registered thermal governor 'step_wise' Dec 13 01:46:51.052154 kernel: thermal_sys: Registered thermal governor 'user_space' Dec 13 01:46:51.052167 kernel: cpuidle: using governor menu Dec 13 01:46:51.052184 kernel: ACPI: bus type PCI registered Dec 13 01:46:51.052197 kernel: acpiphp: ACPI Hot Plug PCI Controller Driver version: 0.5 Dec 13 01:46:51.052211 kernel: dca service started, version 1.12.1 Dec 13 01:46:51.052224 kernel: kprobes: kprobe jump-optimization is enabled. All kprobes are optimized if possible. Dec 13 01:46:51.052237 kernel: HugeTLB registered 1.00 GiB page size, pre-allocated 0 pages Dec 13 01:46:51.052251 kernel: HugeTLB registered 2.00 MiB page size, pre-allocated 0 pages Dec 13 01:46:51.052264 kernel: ACPI: Added _OSI(Module Device) Dec 13 01:46:51.052278 kernel: ACPI: Added _OSI(Processor Device) Dec 13 01:46:51.052291 kernel: ACPI: Added _OSI(3.0 _SCP Extensions) Dec 13 01:46:51.052308 kernel: ACPI: Added _OSI(Processor Aggregator Device) Dec 13 01:46:51.052322 kernel: ACPI: Added _OSI(Linux-Dell-Video) Dec 13 01:46:51.052335 kernel: ACPI: Added _OSI(Linux-Lenovo-NV-HDMI-Audio) Dec 13 01:46:51.052349 kernel: ACPI: Added _OSI(Linux-HPI-Hybrid-Graphics) Dec 13 01:46:51.052362 kernel: ACPI: 1 ACPI AML tables successfully acquired and loaded Dec 13 01:46:51.052375 kernel: ACPI: Interpreter enabled Dec 13 01:46:51.052388 kernel: ACPI: PM: (supports S0 S5) Dec 13 01:46:51.052401 kernel: ACPI: Using IOAPIC for interrupt routing Dec 13 01:46:51.052415 kernel: PCI: Using host bridge windows from ACPI; if necessary, use "pci=nocrs" and report a bug Dec 13 01:46:51.052432 kernel: ACPI: Enabled 1 GPEs in block 00 to 0F Dec 13 01:46:51.052445 kernel: iommu: Default domain type: Translated Dec 13 01:46:51.052457 kernel: iommu: DMA domain TLB invalidation policy: lazy mode Dec 13 01:46:51.052470 kernel: vgaarb: loaded Dec 13 01:46:51.052482 kernel: pps_core: LinuxPPS API ver. 1 registered Dec 13 01:46:51.052494 kernel: pps_core: Software ver. 5.3.6 - Copyright 2005-2007 Rodolfo Giometti Dec 13 01:46:51.052507 kernel: PTP clock support registered Dec 13 01:46:51.052520 kernel: Registered efivars operations Dec 13 01:46:51.052533 kernel: PCI: Using ACPI for IRQ routing Dec 13 01:46:51.052560 kernel: PCI: System does not support PCI Dec 13 01:46:51.052575 kernel: clocksource: Switched to clocksource hyperv_clocksource_tsc_page Dec 13 01:46:51.052588 kernel: VFS: Disk quotas dquot_6.6.0 Dec 13 01:46:51.052601 kernel: VFS: Dquot-cache hash table entries: 512 (order 0, 4096 bytes) Dec 13 01:46:51.052616 kernel: pnp: PnP ACPI init Dec 13 01:46:51.052630 kernel: pnp: PnP ACPI: found 3 devices Dec 13 01:46:51.052644 kernel: clocksource: acpi_pm: mask: 0xffffff max_cycles: 0xffffff, max_idle_ns: 2085701024 ns Dec 13 01:46:51.052658 kernel: NET: Registered PF_INET protocol family Dec 13 01:46:51.052672 kernel: IP idents hash table entries: 131072 (order: 8, 1048576 bytes, linear) Dec 13 01:46:51.052689 kernel: tcp_listen_portaddr_hash hash table entries: 4096 (order: 4, 65536 bytes, linear) Dec 13 01:46:51.052703 kernel: Table-perturb hash table entries: 65536 (order: 6, 262144 bytes, linear) Dec 13 01:46:51.052717 kernel: TCP established hash table entries: 65536 (order: 7, 524288 bytes, linear) Dec 13 01:46:51.052731 kernel: TCP bind hash table entries: 65536 (order: 8, 1048576 bytes, linear) Dec 13 01:46:51.052746 kernel: TCP: Hash tables configured (established 65536 bind 65536) Dec 13 01:46:51.052760 kernel: UDP hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 01:46:51.052774 kernel: UDP-Lite hash table entries: 4096 (order: 5, 131072 bytes, linear) Dec 13 01:46:51.052788 kernel: NET: Registered PF_UNIX/PF_LOCAL protocol family Dec 13 01:46:51.052803 kernel: NET: Registered PF_XDP protocol family Dec 13 01:46:51.052820 kernel: PCI: CLS 0 bytes, default 64 Dec 13 01:46:51.052834 kernel: PCI-DMA: Using software bounce buffering for IO (SWIOTLB) Dec 13 01:46:51.052847 kernel: software IO TLB: mapped [mem 0x000000003a8ad000-0x000000003e8ad000] (64MB) Dec 13 01:46:51.052860 kernel: RAPL PMU: API unit is 2^-32 Joules, 0 fixed counters, 10737418240 ms ovfl timer Dec 13 01:46:51.052872 kernel: Initialise system trusted keyrings Dec 13 01:46:51.052884 kernel: workingset: timestamp_bits=39 max_order=21 bucket_order=0 Dec 13 01:46:51.052896 kernel: Key type asymmetric registered Dec 13 01:46:51.052908 kernel: Asymmetric key parser 'x509' registered Dec 13 01:46:51.052921 kernel: Block layer SCSI generic (bsg) driver version 0.4 loaded (major 249) Dec 13 01:46:51.052935 kernel: io scheduler mq-deadline registered Dec 13 01:46:51.052948 kernel: io scheduler kyber registered Dec 13 01:46:51.052961 kernel: io scheduler bfq registered Dec 13 01:46:51.052973 kernel: ioatdma: Intel(R) QuickData Technology Driver 5.00 Dec 13 01:46:51.052986 kernel: Serial: 8250/16550 driver, 4 ports, IRQ sharing enabled Dec 13 01:46:51.052998 kernel: 00:00: ttyS0 at I/O 0x3f8 (irq = 4, base_baud = 115200) is a 16550A Dec 13 01:46:51.053011 kernel: 00:01: ttyS1 at I/O 0x2f8 (irq = 3, base_baud = 115200) is a 16550A Dec 13 01:46:51.053023 kernel: i8042: PNP: No PS/2 controller found. Dec 13 01:46:51.053184 kernel: rtc_cmos 00:02: registered as rtc0 Dec 13 01:46:51.053296 kernel: rtc_cmos 00:02: setting system clock to 2024-12-13T01:46:50 UTC (1734054410) Dec 13 01:46:51.053398 kernel: rtc_cmos 00:02: alarms up to one month, 114 bytes nvram Dec 13 01:46:51.053415 kernel: fail to initialize ptp_kvm Dec 13 01:46:51.053428 kernel: intel_pstate: CPU model not supported Dec 13 01:46:51.053441 kernel: efifb: probing for efifb Dec 13 01:46:51.053454 kernel: efifb: framebuffer at 0x40000000, using 3072k, total 3072k Dec 13 01:46:51.053467 kernel: efifb: mode is 1024x768x32, linelength=4096, pages=1 Dec 13 01:46:51.053480 kernel: efifb: scrolling: redraw Dec 13 01:46:51.053496 kernel: efifb: Truecolor: size=8:8:8:8, shift=24:16:8:0 Dec 13 01:46:51.053510 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 01:46:51.053522 kernel: fb0: EFI VGA frame buffer device Dec 13 01:46:51.053547 kernel: pstore: Registered efi as persistent store backend Dec 13 01:46:51.053567 kernel: NET: Registered PF_INET6 protocol family Dec 13 01:46:51.053581 kernel: Segment Routing with IPv6 Dec 13 01:46:51.053594 kernel: In-situ OAM (IOAM) with IPv6 Dec 13 01:46:51.053607 kernel: NET: Registered PF_PACKET protocol family Dec 13 01:46:51.053620 kernel: Key type dns_resolver registered Dec 13 01:46:51.053636 kernel: IPI shorthand broadcast: enabled Dec 13 01:46:51.053649 kernel: sched_clock: Marking stable (850950900, 24218800)->(1097934100, -222764400) Dec 13 01:46:51.053662 kernel: registered taskstats version 1 Dec 13 01:46:51.053675 kernel: Loading compiled-in X.509 certificates Dec 13 01:46:51.053688 kernel: Loaded X.509 cert 'Kinvolk GmbH: Module signing key for 5.15.173-flatcar: d9defb0205602bee9bb670636cbe5c74194fdb5e' Dec 13 01:46:51.053701 kernel: Key type .fscrypt registered Dec 13 01:46:51.053713 kernel: Key type fscrypt-provisioning registered Dec 13 01:46:51.053727 kernel: pstore: Using crash dump compression: deflate Dec 13 01:46:51.053743 kernel: ima: No TPM chip found, activating TPM-bypass! Dec 13 01:46:51.053756 kernel: ima: Allocated hash algorithm: sha1 Dec 13 01:46:51.053769 kernel: ima: No architecture policies found Dec 13 01:46:51.053783 kernel: clk: Disabling unused clocks Dec 13 01:46:51.053796 kernel: Freeing unused kernel image (initmem) memory: 47476K Dec 13 01:46:51.053809 kernel: Write protecting the kernel read-only data: 28672k Dec 13 01:46:51.053823 kernel: Freeing unused kernel image (text/rodata gap) memory: 2040K Dec 13 01:46:51.053836 kernel: Freeing unused kernel image (rodata/data gap) memory: 620K Dec 13 01:46:51.053850 kernel: Run /init as init process Dec 13 01:46:51.053863 kernel: with arguments: Dec 13 01:46:51.053878 kernel: /init Dec 13 01:46:51.053890 kernel: with environment: Dec 13 01:46:51.053903 kernel: HOME=/ Dec 13 01:46:51.053915 kernel: TERM=linux Dec 13 01:46:51.053929 kernel: BOOT_IMAGE=/flatcar/vmlinuz-a Dec 13 01:46:51.053945 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:46:51.053961 systemd[1]: Detected virtualization microsoft. Dec 13 01:46:51.053979 systemd[1]: Detected architecture x86-64. Dec 13 01:46:51.053993 systemd[1]: Running in initrd. Dec 13 01:46:51.054006 systemd[1]: No hostname configured, using default hostname. Dec 13 01:46:51.054019 systemd[1]: Hostname set to . Dec 13 01:46:51.054034 systemd[1]: Initializing machine ID from random generator. Dec 13 01:46:51.054048 systemd[1]: Queued start job for default target initrd.target. Dec 13 01:46:51.054061 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:46:51.054074 systemd[1]: Reached target cryptsetup.target. Dec 13 01:46:51.054087 systemd[1]: Reached target paths.target. Dec 13 01:46:51.054104 systemd[1]: Reached target slices.target. Dec 13 01:46:51.054118 systemd[1]: Reached target swap.target. Dec 13 01:46:51.054130 systemd[1]: Reached target timers.target. Dec 13 01:46:51.054144 systemd[1]: Listening on iscsid.socket. Dec 13 01:46:51.054158 systemd[1]: Listening on iscsiuio.socket. Dec 13 01:46:51.054173 systemd[1]: Listening on systemd-journald-audit.socket. Dec 13 01:46:51.054188 systemd[1]: Listening on systemd-journald-dev-log.socket. Dec 13 01:46:51.054206 systemd[1]: Listening on systemd-journald.socket. Dec 13 01:46:51.054222 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:46:51.054235 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:46:51.054249 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:46:51.054262 systemd[1]: Reached target sockets.target. Dec 13 01:46:51.054276 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:46:51.054289 systemd[1]: Finished network-cleanup.service. Dec 13 01:46:51.054302 systemd[1]: Starting systemd-fsck-usr.service... Dec 13 01:46:51.054316 systemd[1]: Starting systemd-journald.service... Dec 13 01:46:51.054332 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:46:51.054346 systemd[1]: Starting systemd-resolved.service... Dec 13 01:46:51.054359 systemd[1]: Starting systemd-vconsole-setup.service... Dec 13 01:46:51.054379 systemd-journald[183]: Journal started Dec 13 01:46:51.054446 systemd-journald[183]: Runtime Journal (/run/log/journal/c66bbf6f03c940f381c51ea91f46cf7c) is 8.0M, max 159.0M, 151.0M free. Dec 13 01:46:51.046044 systemd-modules-load[184]: Inserted module 'overlay' Dec 13 01:46:51.072171 systemd[1]: Started systemd-journald.service. Dec 13 01:46:51.071000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.072463 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:46:51.092748 kernel: audit: type=1130 audit(1734054411.071:2): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.095140 systemd[1]: Finished systemd-fsck-usr.service. Dec 13 01:46:51.097275 systemd[1]: Finished systemd-vconsole-setup.service. Dec 13 01:46:51.102020 systemd[1]: Starting dracut-cmdline-ask.service... Dec 13 01:46:51.128527 kernel: bridge: filtering via arp/ip/ip6tables is no longer available by default. Update your scripts to load br_netfilter if you need this. Dec 13 01:46:51.128567 kernel: audit: type=1130 audit(1734054411.094:3): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.094000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.104223 systemd[1]: Starting systemd-tmpfiles-setup-dev.service... Dec 13 01:46:51.134829 systemd[1]: Finished systemd-tmpfiles-setup-dev.service. Dec 13 01:46:51.142794 systemd-resolved[185]: Positive Trust Anchors: Dec 13 01:46:51.145319 systemd-resolved[185]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:46:51.167413 kernel: Bridge firewalling registered Dec 13 01:46:51.167441 kernel: audit: type=1130 audit(1734054411.096:4): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.096000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.145373 systemd-resolved[185]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:46:51.149234 systemd-resolved[185]: Defaulting to hostname 'linux'. Dec 13 01:46:51.151206 systemd[1]: Started systemd-resolved.service. Dec 13 01:46:51.162948 systemd-modules-load[184]: Inserted module 'br_netfilter' Dec 13 01:46:51.181700 systemd[1]: Reached target nss-lookup.target. Dec 13 01:46:51.100000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.206599 kernel: audit: type=1130 audit(1734054411.100:5): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.136000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.231201 kernel: audit: type=1130 audit(1734054411.136:6): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-tmpfiles-setup-dev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.231242 kernel: audit: type=1130 audit(1734054411.181:7): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.220084 systemd[1]: Finished dracut-cmdline-ask.service. Dec 13 01:46:51.234114 systemd[1]: Starting dracut-cmdline.service... Dec 13 01:46:51.254484 kernel: SCSI subsystem initialized Dec 13 01:46:51.254521 kernel: audit: type=1130 audit(1734054411.232:8): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.232000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.254592 dracut-cmdline[200]: dracut-dracut-053 Dec 13 01:46:51.257785 dracut-cmdline[200]: Using kernel command line parameters: rd.driver.pre=btrfs rootflags=rw mount.usrflags=ro BOOT_IMAGE=/flatcar/vmlinuz-a mount.usr=/dev/mapper/usr verity.usr=PARTUUID=7130c94a-213a-4e5a-8e26-6cce9662f132 rootflags=rw mount.usrflags=ro consoleblank=0 root=LABEL=ROOT console=tty1 console=ttyS0,115200n8 earlyprintk=ttyS0,115200 flatcar.first_boot=detected flatcar.oem.id=azure flatcar.autologin verity.usrhash=66bd2580285375a2ba5b0e34ba63606314bcd90aaed1de1996371bdcb032485c Dec 13 01:46:51.294427 kernel: device-mapper: core: CONFIG_IMA_DISABLE_HTABLE is disabled. Duplicate IMA measurements will not be recorded in the IMA log. Dec 13 01:46:51.294464 kernel: device-mapper: uevent: version 1.0.3 Dec 13 01:46:51.297380 kernel: device-mapper: ioctl: 4.45.0-ioctl (2021-03-22) initialised: dm-devel@redhat.com Dec 13 01:46:51.304138 systemd-modules-load[184]: Inserted module 'dm_multipath' Dec 13 01:46:51.307306 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:46:51.328028 kernel: audit: type=1130 audit(1734054411.311:9): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.311000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.312795 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:46:51.338014 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:46:51.337000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.355555 kernel: audit: type=1130 audit(1734054411.337:10): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.355585 kernel: Loading iSCSI transport class v2.0-870. Dec 13 01:46:51.378553 kernel: iscsi: registered transport (tcp) Dec 13 01:46:51.407770 kernel: iscsi: registered transport (qla4xxx) Dec 13 01:46:51.407818 kernel: QLogic iSCSI HBA Driver Dec 13 01:46:51.436804 systemd[1]: Finished dracut-cmdline.service. Dec 13 01:46:51.440222 systemd[1]: Starting dracut-pre-udev.service... Dec 13 01:46:51.439000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.492563 kernel: raid6: avx512x4 gen() 18360 MB/s Dec 13 01:46:51.513571 kernel: raid6: avx512x4 xor() 8244 MB/s Dec 13 01:46:51.533558 kernel: raid6: avx512x2 gen() 17812 MB/s Dec 13 01:46:51.554554 kernel: raid6: avx512x2 xor() 26818 MB/s Dec 13 01:46:51.574559 kernel: raid6: avx512x1 gen() 17715 MB/s Dec 13 01:46:51.594561 kernel: raid6: avx512x1 xor() 24144 MB/s Dec 13 01:46:51.615566 kernel: raid6: avx2x4 gen() 17367 MB/s Dec 13 01:46:51.636575 kernel: raid6: avx2x4 xor() 7694 MB/s Dec 13 01:46:51.656551 kernel: raid6: avx2x2 gen() 18020 MB/s Dec 13 01:46:51.676553 kernel: raid6: avx2x2 xor() 22160 MB/s Dec 13 01:46:51.696551 kernel: raid6: avx2x1 gen() 14065 MB/s Dec 13 01:46:51.716548 kernel: raid6: avx2x1 xor() 19294 MB/s Dec 13 01:46:51.737553 kernel: raid6: sse2x4 gen() 11737 MB/s Dec 13 01:46:51.757558 kernel: raid6: sse2x4 xor() 7385 MB/s Dec 13 01:46:51.777567 kernel: raid6: sse2x2 gen() 12288 MB/s Dec 13 01:46:51.798566 kernel: raid6: sse2x2 xor() 7396 MB/s Dec 13 01:46:51.818553 kernel: raid6: sse2x1 gen() 11053 MB/s Dec 13 01:46:51.842378 kernel: raid6: sse2x1 xor() 5850 MB/s Dec 13 01:46:51.842405 kernel: raid6: using algorithm avx512x4 gen() 18360 MB/s Dec 13 01:46:51.842427 kernel: raid6: .... xor() 8244 MB/s, rmw enabled Dec 13 01:46:51.846261 kernel: raid6: using avx512x2 recovery algorithm Dec 13 01:46:51.865559 kernel: xor: automatically using best checksumming function avx Dec 13 01:46:51.965560 kernel: Btrfs loaded, crc32c=crc32c-intel, zoned=no, fsverity=no Dec 13 01:46:51.973505 systemd[1]: Finished dracut-pre-udev.service. Dec 13 01:46:51.977000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:51.977000 audit: BPF prog-id=7 op=LOAD Dec 13 01:46:51.977000 audit: BPF prog-id=8 op=LOAD Dec 13 01:46:51.978671 systemd[1]: Starting systemd-udevd.service... Dec 13 01:46:51.993727 systemd-udevd[383]: Using default interface naming scheme 'v252'. Dec 13 01:46:51.998343 systemd[1]: Started systemd-udevd.service. Dec 13 01:46:52.005000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:52.007475 systemd[1]: Starting dracut-pre-trigger.service... Dec 13 01:46:52.022468 dracut-pre-trigger[404]: rd.md=0: removing MD RAID activation Dec 13 01:46:52.049499 systemd[1]: Finished dracut-pre-trigger.service. Dec 13 01:46:52.054000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:52.054876 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:46:52.087007 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:46:52.092000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:52.134550 kernel: cryptd: max_cpu_qlen set to 1000 Dec 13 01:46:52.158558 kernel: AVX2 version of gcm_enc/dec engaged. Dec 13 01:46:52.167552 kernel: AES CTR mode by8 optimization enabled Dec 13 01:46:52.171794 kernel: hv_vmbus: Vmbus version:5.2 Dec 13 01:46:52.188551 kernel: hv_vmbus: registering driver hyperv_keyboard Dec 13 01:46:52.200550 kernel: input: AT Translated Set 2 keyboard as /devices/LNXSYSTM:00/LNXSYBUS:00/ACPI0004:00/VMBUS:00/d34b2567-b9b6-42b9-8778-0a4ec0b955bf/serio0/input/input0 Dec 13 01:46:52.209557 kernel: hv_vmbus: registering driver hv_storvsc Dec 13 01:46:52.209587 kernel: hid: raw HID events driver (C) Jiri Kosina Dec 13 01:46:52.217560 kernel: scsi host1: storvsc_host_t Dec 13 01:46:52.225908 kernel: scsi host0: storvsc_host_t Dec 13 01:46:52.226067 kernel: scsi 0:0:0:0: Direct-Access Msft Virtual Disk 1.0 PQ: 0 ANSI: 5 Dec 13 01:46:52.226093 kernel: hv_vmbus: registering driver hv_netvsc Dec 13 01:46:52.229555 kernel: scsi 0:0:0:2: CD-ROM Msft Virtual DVD-ROM 1.0 PQ: 0 ANSI: 0 Dec 13 01:46:52.246548 kernel: hv_vmbus: registering driver hid_hyperv Dec 13 01:46:52.258602 kernel: input: Microsoft Vmbus HID-compliant Mouse as /devices/0006:045E:0621.0001/input/input1 Dec 13 01:46:52.258637 kernel: hid 0006:045E:0621.0001: input: VIRTUAL HID v0.01 Mouse [Microsoft Vmbus HID-compliant Mouse] on Dec 13 01:46:52.279437 kernel: sr 0:0:0:2: [sr0] scsi-1 drive Dec 13 01:46:52.291388 kernel: cdrom: Uniform CD-ROM driver Revision: 3.20 Dec 13 01:46:52.291409 kernel: sd 0:0:0:0: [sda] 63737856 512-byte logical blocks: (32.6 GB/30.4 GiB) Dec 13 01:46:52.306377 kernel: sd 0:0:0:0: [sda] 4096-byte physical blocks Dec 13 01:46:52.306571 kernel: sd 0:0:0:0: [sda] Write Protect is off Dec 13 01:46:52.306736 kernel: sr 0:0:0:2: Attached scsi CD-ROM sr0 Dec 13 01:46:52.306905 kernel: sd 0:0:0:0: [sda] Mode Sense: 0f 00 10 00 Dec 13 01:46:52.307058 kernel: sd 0:0:0:0: [sda] Write cache: disabled, read cache: enabled, supports DPO and FUA Dec 13 01:46:52.307221 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:46:52.307239 kernel: sd 0:0:0:0: [sda] Attached SCSI disk Dec 13 01:46:52.417217 kernel: hv_netvsc 7c1e5287-e33c-7c1e-5287-e33c7c1e5287 eth0: VF slot 1 added Dec 13 01:46:52.432556 kernel: hv_vmbus: registering driver hv_pci Dec 13 01:46:52.445911 kernel: hv_pci 7af66074-a352-479a-a064-1abf78681156: PCI VMBus probing: Using version 0x10004 Dec 13 01:46:52.530505 kernel: hv_pci 7af66074-a352-479a-a064-1abf78681156: PCI host bridge to bus a352:00 Dec 13 01:46:52.530706 kernel: pci_bus a352:00: root bus resource [mem 0xfe0000000-0xfe00fffff window] Dec 13 01:46:52.530875 kernel: pci_bus a352:00: No busn resource found for root bus, will use [bus 00-ff] Dec 13 01:46:52.531023 kernel: pci a352:00:02.0: [15b3:1016] type 00 class 0x020000 Dec 13 01:46:52.531203 kernel: pci a352:00:02.0: reg 0x10: [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 01:46:52.531363 kernel: pci a352:00:02.0: enabling Extended Tags Dec 13 01:46:52.531515 kernel: pci a352:00:02.0: 0.000 Gb/s available PCIe bandwidth, limited by Unknown x0 link at a352:00:02.0 (capable of 63.008 Gb/s with 8.0 GT/s PCIe x8 link) Dec 13 01:46:52.531770 kernel: pci_bus a352:00: busn_res: [bus 00-ff] end is updated to 00 Dec 13 01:46:52.531911 kernel: pci a352:00:02.0: BAR 0: assigned [mem 0xfe0000000-0xfe00fffff 64bit pref] Dec 13 01:46:52.636567 kernel: mlx5_core a352:00:02.0: firmware version: 14.30.5000 Dec 13 01:46:52.892471 kernel: mlx5_core a352:00:02.0: MLX5E: StrdRq(0) RqSz(1024) StrdSz(256) RxCqeCmprss(0) Dec 13 01:46:52.892688 kernel: BTRFS: device label OEM devid 1 transid 12 /dev/sda6 scanned by (udev-worker) (440) Dec 13 01:46:52.892709 kernel: mlx5_core a352:00:02.0: Supported tc offload range - chains: 1, prios: 1 Dec 13 01:46:52.892857 kernel: mlx5_core a352:00:02.0: mlx5e_tc_post_act_init:40:(pid 513): firmware level support is missing Dec 13 01:46:52.892970 kernel: hv_netvsc 7c1e5287-e33c-7c1e-5287-e33c7c1e5287 eth0: VF registering: eth1 Dec 13 01:46:52.893066 kernel: mlx5_core a352:00:02.0 eth1: joined to eth0 Dec 13 01:46:52.763702 systemd[1]: Found device dev-disk-by\x2dlabel-EFI\x2dSYSTEM.device. Dec 13 01:46:52.811015 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:46:52.907604 kernel: mlx5_core a352:00:02.0 enP41810s1: renamed from eth1 Dec 13 01:46:53.109396 systemd[1]: Found device dev-disk-by\x2dlabel-ROOT.device. Dec 13 01:46:53.152229 systemd[1]: Found device dev-disk-by\x2dpartuuid-7130c94a\x2d213a\x2d4e5a\x2d8e26\x2d6cce9662f132.device. Dec 13 01:46:53.157111 systemd[1]: Found device dev-disk-by\x2dpartlabel-USR\x2dA.device. Dec 13 01:46:53.168342 systemd[1]: Starting disk-uuid.service... Dec 13 01:46:53.182550 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:46:53.191566 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:46:54.200563 kernel: sda: sda1 sda2 sda3 sda4 sda6 sda7 sda9 Dec 13 01:46:54.200993 disk-uuid[563]: The operation has completed successfully. Dec 13 01:46:54.264865 systemd[1]: disk-uuid.service: Deactivated successfully. Dec 13 01:46:54.269000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=disk-uuid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.264968 systemd[1]: Finished disk-uuid.service. Dec 13 01:46:54.283161 systemd[1]: Starting verity-setup.service... Dec 13 01:46:54.314557 kernel: device-mapper: verity: sha256 using implementation "sha256-avx2" Dec 13 01:46:54.671472 systemd[1]: Found device dev-mapper-usr.device. Dec 13 01:46:54.677316 systemd[1]: Mounting sysusr-usr.mount... Dec 13 01:46:54.682086 systemd[1]: Finished verity-setup.service. Dec 13 01:46:54.684000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.754176 systemd[1]: Mounted sysusr-usr.mount. Dec 13 01:46:54.759383 kernel: EXT4-fs (dm-0): mounted filesystem without journal. Opts: norecovery. Quota mode: none. Dec 13 01:46:54.756783 systemd[1]: afterburn-network-kargs.service was skipped because no trigger condition checks were met. Dec 13 01:46:54.759526 systemd[1]: Starting ignition-setup.service... Dec 13 01:46:54.769288 systemd[1]: Starting parse-ip-for-networkd.service... Dec 13 01:46:54.797563 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:46:54.797605 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:46:54.797619 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:46:54.844484 systemd[1]: Finished parse-ip-for-networkd.service. Dec 13 01:46:54.847000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.849000 audit: BPF prog-id=9 op=LOAD Dec 13 01:46:54.850320 systemd[1]: Starting systemd-networkd.service... Dec 13 01:46:54.874306 systemd-networkd[801]: lo: Link UP Dec 13 01:46:54.874315 systemd-networkd[801]: lo: Gained carrier Dec 13 01:46:54.879157 systemd-networkd[801]: Enumeration completed Dec 13 01:46:54.879832 systemd[1]: Started systemd-networkd.service. Dec 13 01:46:54.884000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.882346 systemd-networkd[801]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:46:54.884812 systemd[1]: Reached target network.target. Dec 13 01:46:54.889314 systemd[1]: Starting iscsiuio.service... Dec 13 01:46:54.898082 systemd[1]: Started iscsiuio.service. Dec 13 01:46:54.899000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.900853 systemd[1]: Starting iscsid.service... Dec 13 01:46:54.907695 iscsid[809]: iscsid: can't open InitiatorName configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:46:54.907695 iscsid[809]: iscsid: Warning: InitiatorName file /etc/iscsi/initiatorname.iscsi does not exist or does not contain a properly formatted InitiatorName. If using software iscsi (iscsi_tcp or ib_iser) or partial offload (bnx2i or cxgbi iscsi), you may not be able to log into or discover targets. Please create a file /etc/iscsi/initiatorname.iscsi that contains a sting with the format: InitiatorName=iqn.yyyy-mm.[:identifier]. Dec 13 01:46:54.907695 iscsid[809]: Example: InitiatorName=iqn.2001-04.com.redhat:fc6. Dec 13 01:46:54.907695 iscsid[809]: If using hardware iscsi like qla4xxx this message can be ignored. Dec 13 01:46:54.932620 iscsid[809]: iscsid: can't open InitiatorAlias configuration file /etc/iscsi/initiatorname.iscsi Dec 13 01:46:54.932620 iscsid[809]: iscsid: can't open iscsid.safe_logout configuration file /etc/iscsi/iscsid.conf Dec 13 01:46:54.940988 systemd[1]: Started iscsid.service. Dec 13 01:46:54.956048 kernel: mlx5_core a352:00:02.0 enP41810s1: Link up Dec 13 01:46:54.946000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.948031 systemd[1]: Starting dracut-initqueue.service... Dec 13 01:46:54.955352 systemd[1]: mnt-oem.mount: Deactivated successfully. Dec 13 01:46:54.964424 systemd[1]: Finished dracut-initqueue.service. Dec 13 01:46:54.969000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:54.969639 systemd[1]: Reached target remote-fs-pre.target. Dec 13 01:46:54.973893 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:46:54.973952 systemd[1]: Reached target remote-fs.target. Dec 13 01:46:54.995248 kernel: hv_netvsc 7c1e5287-e33c-7c1e-5287-e33c7c1e5287 eth0: Data path switched to VF: enP41810s1 Dec 13 01:46:55.001557 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:46:55.002708 systemd[1]: Starting dracut-pre-mount.service... Dec 13 01:46:55.005128 systemd-networkd[801]: enP41810s1: Link UP Dec 13 01:46:55.005460 systemd-networkd[801]: eth0: Link UP Dec 13 01:46:55.006357 systemd-networkd[801]: eth0: Gained carrier Dec 13 01:46:55.017509 systemd-networkd[801]: enP41810s1: Gained carrier Dec 13 01:46:55.020524 systemd[1]: Finished dracut-pre-mount.service. Dec 13 01:46:55.026000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.073682 systemd-networkd[801]: eth0: DHCPv4 address 10.200.8.26/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:46:55.416371 systemd[1]: Finished ignition-setup.service. Dec 13 01:46:55.438645 kernel: kauditd_printk_skb: 17 callbacks suppressed Dec 13 01:46:55.438668 kernel: audit: type=1130 audit(1734054415.418:28): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.418000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:46:55.426033 systemd[1]: Starting ignition-fetch-offline.service... Dec 13 01:46:56.211766 systemd-networkd[801]: eth0: Gained IPv6LL Dec 13 01:47:01.216036 ignition[828]: Ignition 2.14.0 Dec 13 01:47:01.216050 ignition[828]: Stage: fetch-offline Dec 13 01:47:01.216129 ignition[828]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:47:01.216173 ignition[828]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:47:01.457361 ignition[828]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:47:01.457598 ignition[828]: parsed url from cmdline: "" Dec 13 01:47:01.459392 systemd[1]: Finished ignition-fetch-offline.service. Dec 13 01:47:01.457602 ignition[828]: no config URL provided Dec 13 01:47:01.457607 ignition[828]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:47:01.457615 ignition[828]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:47:01.457621 ignition[828]: failed to fetch config: resource requires networking Dec 13 01:47:01.457926 ignition[828]: Ignition finished successfully Dec 13 01:47:01.478000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.479448 systemd[1]: Starting ignition-fetch.service... Dec 13 01:47:01.498341 kernel: audit: type=1130 audit(1734054421.478:29): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.487465 ignition[834]: Ignition 2.14.0 Dec 13 01:47:01.487474 ignition[834]: Stage: fetch Dec 13 01:47:01.487592 ignition[834]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:47:01.487619 ignition[834]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:47:01.491031 ignition[834]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:47:01.494262 ignition[834]: parsed url from cmdline: "" Dec 13 01:47:01.494266 ignition[834]: no config URL provided Dec 13 01:47:01.494273 ignition[834]: reading system config file "/usr/lib/ignition/user.ign" Dec 13 01:47:01.494285 ignition[834]: no config at "/usr/lib/ignition/user.ign" Dec 13 01:47:01.494316 ignition[834]: GET http://169.254.169.254/metadata/instance/compute/userData?api-version=2021-01-01&format=text: attempt #1 Dec 13 01:47:01.584075 ignition[834]: GET result: OK Dec 13 01:47:01.584238 ignition[834]: config has been read from IMDS userdata Dec 13 01:47:01.596000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.588014 unknown[834]: fetched base config from "system" Dec 13 01:47:01.615354 kernel: audit: type=1130 audit(1734054421.596:30): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.584279 ignition[834]: parsing config with SHA512: 20f1e581269cd0ed76a84404b904c9131cbf6fdfae4c616e02a838c7b4f2b4a768b4f35588f971331768f7739bc836c92cedd626b9305a62f0dfe27fc8a70366 Dec 13 01:47:01.588022 unknown[834]: fetched base config from "system" Dec 13 01:47:01.588571 ignition[834]: fetch: fetch complete Dec 13 01:47:01.588028 unknown[834]: fetched user config from "azure" Dec 13 01:47:01.588576 ignition[834]: fetch: fetch passed Dec 13 01:47:01.591726 systemd[1]: Finished ignition-fetch.service. Dec 13 01:47:01.588618 ignition[834]: Ignition finished successfully Dec 13 01:47:01.603777 systemd[1]: Starting ignition-kargs.service... Dec 13 01:47:01.642080 ignition[840]: Ignition 2.14.0 Dec 13 01:47:01.642090 ignition[840]: Stage: kargs Dec 13 01:47:01.642225 ignition[840]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:47:01.642257 ignition[840]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:47:01.652004 ignition[840]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:47:01.654060 ignition[840]: kargs: kargs passed Dec 13 01:47:01.654115 ignition[840]: Ignition finished successfully Dec 13 01:47:01.657000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.658023 systemd[1]: Finished ignition-kargs.service. Dec 13 01:47:01.676841 kernel: audit: type=1130 audit(1734054421.657:31): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.660950 systemd[1]: Starting ignition-disks.service... Dec 13 01:47:01.682062 ignition[846]: Ignition 2.14.0 Dec 13 01:47:01.682072 ignition[846]: Stage: disks Dec 13 01:47:01.682206 ignition[846]: reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:47:01.682232 ignition[846]: parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:47:01.687534 systemd[1]: Finished ignition-disks.service. Dec 13 01:47:01.690000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.684631 ignition[846]: no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:47:01.709715 kernel: audit: type=1130 audit(1734054421.690:32): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.691021 systemd[1]: Reached target initrd-root-device.target. Dec 13 01:47:01.686823 ignition[846]: disks: disks passed Dec 13 01:47:01.704796 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:47:01.686865 ignition[846]: Ignition finished successfully Dec 13 01:47:01.709716 systemd[1]: Reached target local-fs.target. Dec 13 01:47:01.713842 systemd[1]: Reached target sysinit.target. Dec 13 01:47:01.717797 systemd[1]: Reached target basic.target. Dec 13 01:47:01.729653 systemd[1]: Starting systemd-fsck-root.service... Dec 13 01:47:01.804897 systemd-fsck[854]: ROOT: clean, 621/7326000 files, 481077/7359488 blocks Dec 13 01:47:01.810956 systemd[1]: Finished systemd-fsck-root.service. Dec 13 01:47:01.815000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.827723 systemd[1]: Mounting sysroot.mount... Dec 13 01:47:01.834092 kernel: audit: type=1130 audit(1734054421.815:33): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:01.884559 kernel: EXT4-fs (sda9): mounted filesystem with ordered data mode. Opts: (null). Quota mode: none. Dec 13 01:47:01.885246 systemd[1]: Mounted sysroot.mount. Dec 13 01:47:01.889981 systemd[1]: Reached target initrd-root-fs.target. Dec 13 01:47:01.910028 systemd[1]: Mounting sysroot-usr.mount... Dec 13 01:47:01.913426 systemd[1]: Starting flatcar-metadata-hostname.service... Dec 13 01:47:01.920870 systemd[1]: ignition-remount-sysroot.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/sysroot). Dec 13 01:47:01.921865 systemd[1]: Reached target ignition-diskful.target. Dec 13 01:47:01.932755 systemd[1]: Mounted sysroot-usr.mount. Dec 13 01:47:02.040717 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:47:02.047497 systemd[1]: Starting initrd-setup-root.service... Dec 13 01:47:02.058289 kernel: BTRFS: device label OEM devid 1 transid 14 /dev/sda6 scanned by mount (865) Dec 13 01:47:02.067355 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:47:02.067395 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:47:02.067411 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:47:02.075495 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:47:02.084501 initrd-setup-root[870]: cut: /sysroot/etc/passwd: No such file or directory Dec 13 01:47:02.128926 initrd-setup-root[896]: cut: /sysroot/etc/group: No such file or directory Dec 13 01:47:02.165983 initrd-setup-root[904]: cut: /sysroot/etc/shadow: No such file or directory Dec 13 01:47:02.174184 initrd-setup-root[912]: cut: /sysroot/etc/gshadow: No such file or directory Dec 13 01:47:03.121848 systemd[1]: Finished initrd-setup-root.service. Dec 13 01:47:03.127000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:03.128031 systemd[1]: Starting ignition-mount.service... Dec 13 01:47:03.144503 kernel: audit: type=1130 audit(1734054423.127:34): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:03.144256 systemd[1]: Starting sysroot-boot.service... Dec 13 01:47:03.149992 systemd[1]: sysusr-usr-share-oem.mount: Deactivated successfully. Dec 13 01:47:03.152822 systemd[1]: sysroot-usr-share-oem.mount: Deactivated successfully. Dec 13 01:47:03.167098 ignition[931]: INFO : Ignition 2.14.0 Dec 13 01:47:03.167098 ignition[931]: INFO : Stage: mount Dec 13 01:47:03.171610 ignition[931]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:47:03.171610 ignition[931]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:47:03.181693 ignition[931]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:47:03.187123 ignition[931]: INFO : mount: mount passed Dec 13 01:47:03.189427 ignition[931]: INFO : Ignition finished successfully Dec 13 01:47:03.192097 systemd[1]: Finished sysroot-boot.service. Dec 13 01:47:03.195000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:03.196818 systemd[1]: Finished ignition-mount.service. Dec 13 01:47:03.212450 kernel: audit: type=1130 audit(1734054423.195:35): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:03.212000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:03.223548 kernel: audit: type=1130 audit(1734054423.212:36): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:04.724284 coreos-metadata[864]: Dec 13 01:47:04.724 INFO Fetching http://168.63.129.16/?comp=versions: Attempt #1 Dec 13 01:47:04.755912 coreos-metadata[864]: Dec 13 01:47:04.755 INFO Fetch successful Dec 13 01:47:04.792215 coreos-metadata[864]: Dec 13 01:47:04.792 INFO Fetching http://169.254.169.254/metadata/instance/compute/name?api-version=2017-08-01&format=text: Attempt #1 Dec 13 01:47:04.811944 coreos-metadata[864]: Dec 13 01:47:04.811 INFO Fetch successful Dec 13 01:47:04.842026 coreos-metadata[864]: Dec 13 01:47:04.841 INFO wrote hostname ci-3510.3.6-a-92bad84337 to /sysroot/etc/hostname Dec 13 01:47:04.848479 systemd[1]: Finished flatcar-metadata-hostname.service. Dec 13 01:47:04.854000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:04.857101 systemd[1]: Starting ignition-files.service... Dec 13 01:47:04.874555 kernel: audit: type=1130 audit(1734054424.854:37): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:04.883094 systemd[1]: Mounting sysroot-usr-share-oem.mount... Dec 13 01:47:04.900057 kernel: BTRFS: device label OEM devid 1 transid 15 /dev/sda6 scanned by mount (943) Dec 13 01:47:04.910782 kernel: BTRFS info (device sda6): using crc32c (crc32c-intel) checksum algorithm Dec 13 01:47:04.910823 kernel: BTRFS info (device sda6): using free space tree Dec 13 01:47:04.910834 kernel: BTRFS info (device sda6): has skinny extents Dec 13 01:47:04.920042 systemd[1]: Mounted sysroot-usr-share-oem.mount. Dec 13 01:47:04.935775 ignition[962]: INFO : Ignition 2.14.0 Dec 13 01:47:04.935775 ignition[962]: INFO : Stage: files Dec 13 01:47:04.940012 ignition[962]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:47:04.940012 ignition[962]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:47:04.940012 ignition[962]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:47:04.952869 ignition[962]: DEBUG : files: compiled without relabeling support, skipping Dec 13 01:47:04.952869 ignition[962]: INFO : files: ensureUsers: op(1): [started] creating or modifying user "core" Dec 13 01:47:04.952869 ignition[962]: DEBUG : files: ensureUsers: op(1): executing: "usermod" "--root" "/sysroot" "core" Dec 13 01:47:05.082578 ignition[962]: INFO : files: ensureUsers: op(1): [finished] creating or modifying user "core" Dec 13 01:47:05.089369 ignition[962]: INFO : files: ensureUsers: op(2): [started] adding ssh keys to user "core" Dec 13 01:47:05.089369 ignition[962]: INFO : files: ensureUsers: op(2): [finished] adding ssh keys to user "core" Dec 13 01:47:05.087766 unknown[962]: wrote ssh authorized keys file for user: core Dec 13 01:47:05.115123 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [started] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:47:05.121318 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET https://get.helm.sh/helm-v3.13.2-linux-amd64.tar.gz: attempt #1 Dec 13 01:47:05.350387 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): GET result: OK Dec 13 01:47:05.423079 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(3): [finished] writing file "/sysroot/opt/helm-v3.13.2-linux-amd64.tar.gz" Dec 13 01:47:05.431306 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [started] writing file "/sysroot/home/core/install.sh" Dec 13 01:47:05.437926 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(4): [finished] writing file "/sysroot/home/core/install.sh" Dec 13 01:47:05.443498 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [started] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:47:05.448563 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(5): [finished] writing file "/sysroot/home/core/nginx.yaml" Dec 13 01:47:05.453529 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [started] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:47:05.457967 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(6): [finished] writing file "/sysroot/home/core/nfs-pod.yaml" Dec 13 01:47:05.463062 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [started] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:47:05.470582 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(7): [finished] writing file "/sysroot/home/core/nfs-pvc.yaml" Dec 13 01:47:05.470582 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [started] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:47:05.470582 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(8): [finished] writing file "/sysroot/etc/flatcar/update.conf" Dec 13 01:47:05.470582 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [started] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 01:47:05.470582 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(9): [finished] writing link "/sysroot/etc/extensions/kubernetes.raw" -> "/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 01:47:05.470582 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [started] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 01:47:05.470582 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 01:47:05.518389 kernel: BTRFS info: devid 1 device path /dev/sda6 changed to /dev/disk/by-label/OEM scanned by ignition (962) Dec 13 01:47:05.494978 systemd[1]: mnt-oem557343499.mount: Deactivated successfully. Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(b): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem557343499" Dec 13 01:47:05.521022 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(a): op(b): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem557343499": device or resource busy Dec 13 01:47:05.521022 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(a): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem557343499", trying btrfs: device or resource busy Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem557343499" Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(c): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem557343499" Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [started] unmounting "/mnt/oem557343499" Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): op(d): [finished] unmounting "/mnt/oem557343499" Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(a): [finished] writing file "/sysroot/etc/systemd/system/waagent.service" Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [started] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): oem config not found in "/usr/share/oem", looking on oem partition Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(f): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4106517583" Dec 13 01:47:05.521022 ignition[962]: CRITICAL : files: createFilesystemsFiles: createFiles: op(e): op(f): [failed] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4106517583": device or resource busy Dec 13 01:47:05.521022 ignition[962]: ERROR : files: createFilesystemsFiles: createFiles: op(e): failed to mount ext4 device "/dev/disk/by-label/OEM" at "/mnt/oem4106517583", trying btrfs: device or resource busy Dec 13 01:47:05.521022 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [started] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4106517583" Dec 13 01:47:05.512140 systemd[1]: mnt-oem4106517583.mount: Deactivated successfully. Dec 13 01:47:05.605050 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(10): [finished] mounting "/dev/disk/by-label/OEM" at "/mnt/oem4106517583" Dec 13 01:47:05.605050 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [started] unmounting "/mnt/oem4106517583" Dec 13 01:47:05.605050 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): op(11): [finished] unmounting "/mnt/oem4106517583" Dec 13 01:47:05.605050 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(e): [finished] writing file "/sysroot/etc/systemd/system/nvidia.service" Dec 13 01:47:05.605050 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): [started] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 01:47:05.605050 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET https://github.com/flatcar/sysext-bakery/releases/download/latest/kubernetes-v1.31.0-x86-64.raw: attempt #1 Dec 13 01:47:06.016709 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): GET result: OK Dec 13 01:47:06.423665 ignition[962]: INFO : files: createFilesystemsFiles: createFiles: op(12): [finished] writing file "/sysroot/opt/extensions/kubernetes/kubernetes-v1.31.0-x86-64.raw" Dec 13 01:47:06.423665 ignition[962]: INFO : files: op(13): [started] processing unit "waagent.service" Dec 13 01:47:06.423665 ignition[962]: INFO : files: op(13): [finished] processing unit "waagent.service" Dec 13 01:47:06.423665 ignition[962]: INFO : files: op(14): [started] processing unit "nvidia.service" Dec 13 01:47:06.423665 ignition[962]: INFO : files: op(14): [finished] processing unit "nvidia.service" Dec 13 01:47:06.423665 ignition[962]: INFO : files: op(15): [started] processing unit "prepare-helm.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: op(15): op(16): [started] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: op(15): op(16): [finished] writing unit "prepare-helm.service" at "/sysroot/etc/systemd/system/prepare-helm.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: op(15): [finished] processing unit "prepare-helm.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: op(17): [started] setting preset to enabled for "nvidia.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: op(17): [finished] setting preset to enabled for "nvidia.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: op(18): [started] setting preset to enabled for "prepare-helm.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: op(18): [finished] setting preset to enabled for "prepare-helm.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: op(19): [started] setting preset to enabled for "waagent.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: op(19): [finished] setting preset to enabled for "waagent.service" Dec 13 01:47:06.447552 ignition[962]: INFO : files: createResultFile: createFiles: op(1a): [started] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:47:06.447552 ignition[962]: INFO : files: createResultFile: createFiles: op(1a): [finished] writing file "/sysroot/etc/.ignition-result.json" Dec 13 01:47:06.447552 ignition[962]: INFO : files: files passed Dec 13 01:47:06.447552 ignition[962]: INFO : Ignition finished successfully Dec 13 01:47:06.501452 systemd[1]: Finished ignition-files.service. Dec 13 01:47:06.504000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.507298 systemd[1]: Starting initrd-setup-root-after-ignition.service... Dec 13 01:47:06.526523 kernel: audit: type=1130 audit(1734054426.504:38): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.522149 systemd[1]: torcx-profile-populate.service was skipped because of an unmet condition check (ConditionPathExists=/sysroot/etc/torcx/next-profile). Dec 13 01:47:06.534471 initrd-setup-root-after-ignition[986]: grep: /sysroot/etc/flatcar/enabled-sysext.conf: No such file or directory Dec 13 01:47:06.553834 kernel: audit: type=1130 audit(1734054426.534:39): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.534000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.523032 systemd[1]: Starting ignition-quench.service... Dec 13 01:47:06.527084 systemd[1]: Finished initrd-setup-root-after-ignition.service. Dec 13 01:47:06.534595 systemd[1]: Reached target ignition-complete.target. Dec 13 01:47:06.548104 systemd[1]: Starting initrd-parse-etc.service... Dec 13 01:47:06.569093 systemd[1]: ignition-quench.service: Deactivated successfully. Dec 13 01:47:06.584582 kernel: audit: type=1130 audit(1734054426.571:40): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.571000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.569207 systemd[1]: Finished ignition-quench.service. Dec 13 01:47:06.571000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.597558 kernel: audit: type=1131 audit(1734054426.571:41): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-quench comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.602593 systemd[1]: initrd-parse-etc.service: Deactivated successfully. Dec 13 01:47:06.605181 systemd[1]: Finished initrd-parse-etc.service. Dec 13 01:47:06.609000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.609448 systemd[1]: Reached target initrd-fs.target. Dec 13 01:47:06.609000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.636155 systemd[1]: Reached target initrd.target. Dec 13 01:47:06.641954 kernel: audit: type=1130 audit(1734054426.609:42): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.641988 kernel: audit: type=1131 audit(1734054426.609:43): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-parse-etc comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.642034 systemd[1]: dracut-mount.service was skipped because no trigger condition checks were met. Dec 13 01:47:06.647371 systemd[1]: Starting dracut-pre-pivot.service... Dec 13 01:47:06.664072 systemd[1]: Finished dracut-pre-pivot.service. Dec 13 01:47:06.666000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.680830 systemd[1]: Starting initrd-cleanup.service... Dec 13 01:47:06.683162 kernel: audit: type=1130 audit(1734054426.666:44): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.690778 systemd[1]: Stopped target nss-lookup.target. Dec 13 01:47:06.695295 systemd[1]: Stopped target remote-cryptsetup.target. Dec 13 01:47:06.699371 systemd[1]: Stopped target timers.target. Dec 13 01:47:06.703372 systemd[1]: dracut-pre-pivot.service: Deactivated successfully. Dec 13 01:47:06.707000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.703491 systemd[1]: Stopped dracut-pre-pivot.service. Dec 13 01:47:06.727866 kernel: audit: type=1131 audit(1734054426.707:45): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-pivot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.723679 systemd[1]: Stopped target initrd.target. Dec 13 01:47:06.727962 systemd[1]: Stopped target basic.target. Dec 13 01:47:06.731978 systemd[1]: Stopped target ignition-complete.target. Dec 13 01:47:06.736275 systemd[1]: Stopped target ignition-diskful.target. Dec 13 01:47:06.740804 systemd[1]: Stopped target initrd-root-device.target. Dec 13 01:47:06.747757 systemd[1]: Stopped target remote-fs.target. Dec 13 01:47:06.751953 systemd[1]: Stopped target remote-fs-pre.target. Dec 13 01:47:06.756419 systemd[1]: Stopped target sysinit.target. Dec 13 01:47:06.760683 systemd[1]: Stopped target local-fs.target. Dec 13 01:47:06.764981 systemd[1]: Stopped target local-fs-pre.target. Dec 13 01:47:06.769195 systemd[1]: Stopped target swap.target. Dec 13 01:47:06.773067 systemd[1]: dracut-pre-mount.service: Deactivated successfully. Dec 13 01:47:06.775697 systemd[1]: Stopped dracut-pre-mount.service. Dec 13 01:47:06.779000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.779917 systemd[1]: Stopped target cryptsetup.target. Dec 13 01:47:06.798962 kernel: audit: type=1131 audit(1734054426.779:46): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.799098 systemd[1]: dracut-initqueue.service: Deactivated successfully. Dec 13 01:47:06.801925 systemd[1]: Stopped dracut-initqueue.service. Dec 13 01:47:06.807000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.808994 systemd[1]: initrd-setup-root-after-ignition.service: Deactivated successfully. Dec 13 01:47:06.828578 kernel: audit: type=1131 audit(1734054426.807:47): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-initqueue comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.811170 systemd[1]: Stopped initrd-setup-root-after-ignition.service. Dec 13 01:47:06.831000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root-after-ignition comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.831368 systemd[1]: ignition-files.service: Deactivated successfully. Dec 13 01:47:06.834605 systemd[1]: Stopped ignition-files.service. Dec 13 01:47:06.839000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-files comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.839453 systemd[1]: flatcar-metadata-hostname.service: Deactivated successfully. Dec 13 01:47:06.842431 systemd[1]: Stopped flatcar-metadata-hostname.service. Dec 13 01:47:06.846000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=flatcar-metadata-hostname comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.848111 systemd[1]: Stopping ignition-mount.service... Dec 13 01:47:06.853661 systemd[1]: Stopping iscsiuio.service... Dec 13 01:47:06.861000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.857428 systemd[1]: kmod-static-nodes.service: Deactivated successfully. Dec 13 01:47:06.864613 ignition[1001]: INFO : Ignition 2.14.0 Dec 13 01:47:06.864613 ignition[1001]: INFO : Stage: umount Dec 13 01:47:06.864613 ignition[1001]: INFO : reading system config file "/usr/lib/ignition/base.d/base.ign" Dec 13 01:47:06.864613 ignition[1001]: DEBUG : parsing config with SHA512: 4824fd4a4e57848da530dc2b56e2d3e9f5f19634d1c84ef29f8fc49255520728d0377a861a375d7c8cb5301ed861ff4ede4b440b074b1d6a86e23be9cefc2f63 Dec 13 01:47:06.864613 ignition[1001]: INFO : no config dir at "/usr/lib/ignition/base.platform.d/azure" Dec 13 01:47:06.857620 systemd[1]: Stopped kmod-static-nodes.service. Dec 13 01:47:06.882466 ignition[1001]: INFO : umount: umount passed Dec 13 01:47:06.882466 ignition[1001]: INFO : Ignition finished successfully Dec 13 01:47:06.887136 systemd[1]: Stopping sysroot-boot.service... Dec 13 01:47:06.889042 systemd[1]: systemd-udev-trigger.service: Deactivated successfully. Dec 13 01:47:06.895000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.891008 systemd[1]: Stopped systemd-udev-trigger.service. Dec 13 01:47:06.898000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.896061 systemd[1]: dracut-pre-trigger.service: Deactivated successfully. Dec 13 01:47:06.896208 systemd[1]: Stopped dracut-pre-trigger.service. Dec 13 01:47:06.908166 systemd[1]: iscsiuio.service: Deactivated successfully. Dec 13 01:47:06.910000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=iscsiuio comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.908305 systemd[1]: Stopped iscsiuio.service. Dec 13 01:47:06.911406 systemd[1]: ignition-mount.service: Deactivated successfully. Dec 13 01:47:06.919000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-mount comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.921000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-disks comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.924000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-kargs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.928000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.911503 systemd[1]: Stopped ignition-mount.service. Dec 13 01:47:06.934000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-fetch-offline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.919951 systemd[1]: ignition-disks.service: Deactivated successfully. Dec 13 01:47:06.920046 systemd[1]: Stopped ignition-disks.service. Dec 13 01:47:06.924148 systemd[1]: ignition-kargs.service: Deactivated successfully. Dec 13 01:47:06.924195 systemd[1]: Stopped ignition-kargs.service. Dec 13 01:47:06.926179 systemd[1]: ignition-fetch.service: Deactivated successfully. Dec 13 01:47:06.926289 systemd[1]: Stopped ignition-fetch.service. Dec 13 01:47:06.928278 systemd[1]: Stopped target network.target. Dec 13 01:47:06.930249 systemd[1]: ignition-fetch-offline.service: Deactivated successfully. Dec 13 01:47:06.930296 systemd[1]: Stopped ignition-fetch-offline.service. Dec 13 01:47:06.934509 systemd[1]: Stopped target paths.target. Dec 13 01:47:06.936323 systemd[1]: systemd-ask-password-console.path: Deactivated successfully. Dec 13 01:47:06.939582 systemd[1]: Stopped systemd-ask-password-console.path. Dec 13 01:47:06.943227 systemd[1]: Stopped target slices.target. Dec 13 01:47:06.950000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=ignition-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.985000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.985000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.945169 systemd[1]: Stopped target sockets.target. Dec 13 01:47:06.989000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.950610 systemd[1]: iscsid.socket: Deactivated successfully. Dec 13 01:47:06.950641 systemd[1]: Closed iscsid.socket. Dec 13 01:47:06.951008 systemd[1]: iscsiuio.socket: Deactivated successfully. Dec 13 01:47:06.994000 audit: BPF prog-id=6 op=UNLOAD Dec 13 01:47:06.951045 systemd[1]: Closed iscsiuio.socket. Dec 13 01:47:06.951441 systemd[1]: ignition-setup.service: Deactivated successfully. Dec 13 01:47:07.004000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:06.951479 systemd[1]: Stopped ignition-setup.service. Dec 13 01:47:06.952138 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:47:06.952384 systemd[1]: Stopping systemd-resolved.service... Dec 13 01:47:06.954169 systemd[1]: sysroot-boot.mount: Deactivated successfully. Dec 13 01:47:06.954663 systemd[1]: initrd-cleanup.service: Deactivated successfully. Dec 13 01:47:06.954750 systemd[1]: Finished initrd-cleanup.service. Dec 13 01:47:06.985491 systemd[1]: systemd-resolved.service: Deactivated successfully. Dec 13 01:47:06.985618 systemd[1]: Stopped systemd-resolved.service. Dec 13 01:47:06.995760 systemd-networkd[801]: eth0: DHCPv6 lease lost Dec 13 01:47:07.000778 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:47:07.001375 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:47:07.006827 systemd[1]: systemd-networkd.socket: Deactivated successfully. Dec 13 01:47:07.006868 systemd[1]: Closed systemd-networkd.socket. Dec 13 01:47:07.045000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=parse-ip-for-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.034719 systemd[1]: Stopping network-cleanup.service... Dec 13 01:47:07.050000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.038913 systemd[1]: parse-ip-for-networkd.service: Deactivated successfully. Dec 13 01:47:07.038994 systemd[1]: Stopped parse-ip-for-networkd.service. Dec 13 01:47:07.057000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.046122 systemd[1]: systemd-sysctl.service: Deactivated successfully. Dec 13 01:47:07.057000 audit: BPF prog-id=9 op=UNLOAD Dec 13 01:47:07.046189 systemd[1]: Stopped systemd-sysctl.service. Dec 13 01:47:07.050409 systemd[1]: systemd-modules-load.service: Deactivated successfully. Dec 13 01:47:07.066000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.052915 systemd[1]: Stopped systemd-modules-load.service. Dec 13 01:47:07.057894 systemd[1]: Stopping systemd-udevd.service... Dec 13 01:47:07.063269 systemd[1]: run-credentials-systemd\x2dsysctl.service.mount: Deactivated successfully. Dec 13 01:47:07.063829 systemd[1]: systemd-udevd.service: Deactivated successfully. Dec 13 01:47:07.085000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-pre-udev comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.063964 systemd[1]: Stopped systemd-udevd.service. Dec 13 01:47:07.089000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.091000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=dracut-cmdline-ask comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.069724 systemd[1]: systemd-udevd-control.socket: Deactivated successfully. Dec 13 01:47:07.069776 systemd[1]: Closed systemd-udevd-control.socket. Dec 13 01:47:07.101000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=systemd-vconsole-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.106000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.073007 systemd[1]: systemd-udevd-kernel.socket: Deactivated successfully. Dec 13 01:47:07.115235 kernel: hv_netvsc 7c1e5287-e33c-7c1e-5287-e33c7c1e5287 eth0: Data path switched from VF: enP41810s1 Dec 13 01:47:07.106000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-udevadm-cleanup-db comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.073046 systemd[1]: Closed systemd-udevd-kernel.socket. Dec 13 01:47:07.079693 systemd[1]: dracut-pre-udev.service: Deactivated successfully. Dec 13 01:47:07.079754 systemd[1]: Stopped dracut-pre-udev.service. Dec 13 01:47:07.087843 systemd[1]: dracut-cmdline.service: Deactivated successfully. Dec 13 01:47:07.087894 systemd[1]: Stopped dracut-cmdline.service. Dec 13 01:47:07.089932 systemd[1]: dracut-cmdline-ask.service: Deactivated successfully. Dec 13 01:47:07.089976 systemd[1]: Stopped dracut-cmdline-ask.service. Dec 13 01:47:07.094851 systemd[1]: Starting initrd-udevadm-cleanup-db.service... Dec 13 01:47:07.098946 systemd[1]: systemd-vconsole-setup.service: Deactivated successfully. Dec 13 01:47:07.099015 systemd[1]: Stopped systemd-vconsole-setup.service. Dec 13 01:47:07.103674 systemd[1]: initrd-udevadm-cleanup-db.service: Deactivated successfully. Dec 13 01:47:07.103768 systemd[1]: Finished initrd-udevadm-cleanup-db.service. Dec 13 01:47:07.150478 systemd[1]: network-cleanup.service: Deactivated successfully. Dec 13 01:47:07.150646 systemd[1]: Stopped network-cleanup.service. Dec 13 01:47:07.157000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=network-cleanup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.473831 systemd[1]: sysroot-boot.service: Deactivated successfully. Dec 13 01:47:07.478000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=sysroot-boot comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.473962 systemd[1]: Stopped sysroot-boot.service. Dec 13 01:47:07.480330 systemd[1]: Reached target initrd-switch-root.target. Dec 13 01:47:07.489000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=kernel msg='unit=initrd-setup-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:07.485051 systemd[1]: initrd-setup-root.service: Deactivated successfully. Dec 13 01:47:07.485120 systemd[1]: Stopped initrd-setup-root.service. Dec 13 01:47:07.491188 systemd[1]: Starting initrd-switch-root.service... Dec 13 01:47:07.504385 systemd[1]: Switching root. Dec 13 01:47:07.529546 systemd-journald[183]: Received SIGTERM from PID 1 (systemd). Dec 13 01:47:07.529627 iscsid[809]: iscsid shutting down. Dec 13 01:47:07.531532 systemd-journald[183]: Journal stopped Dec 13 01:47:31.345723 kernel: SELinux: Class mctp_socket not defined in policy. Dec 13 01:47:31.345753 kernel: SELinux: Class anon_inode not defined in policy. Dec 13 01:47:31.345765 kernel: SELinux: the above unknown classes and permissions will be allowed Dec 13 01:47:31.345775 kernel: SELinux: policy capability network_peer_controls=1 Dec 13 01:47:31.345782 kernel: SELinux: policy capability open_perms=1 Dec 13 01:47:31.345793 kernel: SELinux: policy capability extended_socket_class=1 Dec 13 01:47:31.345804 kernel: SELinux: policy capability always_check_network=0 Dec 13 01:47:31.345816 kernel: SELinux: policy capability cgroup_seclabel=1 Dec 13 01:47:31.345824 kernel: SELinux: policy capability nnp_nosuid_transition=1 Dec 13 01:47:31.345835 kernel: SELinux: policy capability genfs_seclabel_symlinks=0 Dec 13 01:47:31.345844 kernel: SELinux: policy capability ioctl_skip_cloexec=0 Dec 13 01:47:31.345855 systemd[1]: Successfully loaded SELinux policy in 520.440ms. Dec 13 01:47:31.345868 systemd[1]: Relabelled /dev, /dev/shm, /run, /sys/fs/cgroup in 44.044ms. Dec 13 01:47:31.345879 systemd[1]: systemd 252 running in system mode (+PAM +AUDIT +SELINUX -APPARMOR +IMA +SMACK +SECCOMP +GCRYPT -GNUTLS +OPENSSL -ACL +BLKID +CURL -ELFUTILS -FIDO2 +IDN2 -IDN +IPTC +KMOD +LIBCRYPTSETUP +LIBFDISK +PCRE2 -PWQUALITY -P11KIT -QRENCODE -TPM2 +BZIP2 +LZ4 +XZ +ZLIB +ZSTD -BPF_FRAMEWORK -XKBCOMMON +UTMP +SYSVINIT default-hierarchy=unified) Dec 13 01:47:31.345893 systemd[1]: Detected virtualization microsoft. Dec 13 01:47:31.345905 systemd[1]: Detected architecture x86-64. Dec 13 01:47:31.345916 systemd[1]: Detected first boot. Dec 13 01:47:31.345928 systemd[1]: Hostname set to . Dec 13 01:47:31.345937 systemd[1]: Initializing machine ID from random generator. Dec 13 01:47:31.345950 kernel: kauditd_printk_skb: 33 callbacks suppressed Dec 13 01:47:31.345960 kernel: audit: type=1400 audit(1734054431.677:81): avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:47:31.345972 kernel: audit: type=1400 audit(1734054431.699:82): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:47:31.345982 kernel: audit: type=1400 audit(1734054431.699:83): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:47:31.345993 kernel: audit: type=1334 audit(1734054431.731:84): prog-id=10 op=LOAD Dec 13 01:47:31.346002 kernel: audit: type=1334 audit(1734054431.731:85): prog-id=10 op=UNLOAD Dec 13 01:47:31.346014 kernel: audit: type=1334 audit(1734054431.740:86): prog-id=11 op=LOAD Dec 13 01:47:31.346023 kernel: audit: type=1334 audit(1734054431.740:87): prog-id=11 op=UNLOAD Dec 13 01:47:31.346034 kernel: SELinux: Context system_u:object_r:container_file_t:s0:c1022,c1023 is not valid (left unmapped). Dec 13 01:47:31.346044 kernel: audit: type=1400 audit(1734054434.585:88): avc: denied { associate } for pid=1035 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:47:31.346055 kernel: audit: type=1300 audit(1734054434.585:88): arch=c000003e syscall=188 success=yes exit=0 a0=c000024302 a1=c00002a3d8 a2=c000028840 a3=32 items=0 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:31.346065 kernel: audit: type=1327 audit(1734054434.585:88): proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:47:31.346076 systemd[1]: Populated /etc with preset unit settings. Dec 13 01:47:31.346090 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:47:31.346100 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:47:31.346113 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:47:31.346122 kernel: kauditd_printk_skb: 6 callbacks suppressed Dec 13 01:47:31.346134 kernel: audit: type=1334 audit(1734054450.743:90): prog-id=12 op=LOAD Dec 13 01:47:31.346143 kernel: audit: type=1334 audit(1734054450.743:91): prog-id=3 op=UNLOAD Dec 13 01:47:31.346154 kernel: audit: type=1334 audit(1734054450.752:92): prog-id=13 op=LOAD Dec 13 01:47:31.346166 kernel: audit: type=1334 audit(1734054450.762:93): prog-id=14 op=LOAD Dec 13 01:47:31.346177 kernel: audit: type=1334 audit(1734054450.762:94): prog-id=4 op=UNLOAD Dec 13 01:47:31.346189 kernel: audit: type=1334 audit(1734054450.762:95): prog-id=5 op=UNLOAD Dec 13 01:47:31.346200 kernel: audit: type=1334 audit(1734054450.767:96): prog-id=15 op=LOAD Dec 13 01:47:31.346212 kernel: audit: type=1334 audit(1734054450.767:97): prog-id=12 op=UNLOAD Dec 13 01:47:31.346220 kernel: audit: type=1334 audit(1734054450.772:98): prog-id=16 op=LOAD Dec 13 01:47:31.346230 kernel: audit: type=1334 audit(1734054450.777:99): prog-id=17 op=LOAD Dec 13 01:47:31.346241 systemd[1]: iscsid.service: Deactivated successfully. Dec 13 01:47:31.346253 systemd[1]: Stopped iscsid.service. Dec 13 01:47:31.346265 systemd[1]: initrd-switch-root.service: Deactivated successfully. Dec 13 01:47:31.346278 systemd[1]: Stopped initrd-switch-root.service. Dec 13 01:47:31.346290 systemd[1]: systemd-journald.service: Scheduled restart job, restart counter is at 1. Dec 13 01:47:31.346300 systemd[1]: Created slice system-addon\x2dconfig.slice. Dec 13 01:47:31.346311 systemd[1]: Created slice system-addon\x2drun.slice. Dec 13 01:47:31.346322 systemd[1]: Created slice system-getty.slice. Dec 13 01:47:31.346334 systemd[1]: Created slice system-modprobe.slice. Dec 13 01:47:31.346344 systemd[1]: Created slice system-serial\x2dgetty.slice. Dec 13 01:47:31.346358 systemd[1]: Created slice system-system\x2dcloudinit.slice. Dec 13 01:47:31.346372 systemd[1]: Created slice system-systemd\x2dfsck.slice. Dec 13 01:47:31.346382 systemd[1]: Created slice user.slice. Dec 13 01:47:31.346393 systemd[1]: Started systemd-ask-password-console.path. Dec 13 01:47:31.346403 systemd[1]: Started systemd-ask-password-wall.path. Dec 13 01:47:31.346415 systemd[1]: Set up automount boot.automount. Dec 13 01:47:31.346425 systemd[1]: Set up automount proc-sys-fs-binfmt_misc.automount. Dec 13 01:47:31.346437 systemd[1]: Stopped target initrd-switch-root.target. Dec 13 01:47:31.346447 systemd[1]: Stopped target initrd-fs.target. Dec 13 01:47:31.346461 systemd[1]: Stopped target initrd-root-fs.target. Dec 13 01:47:31.346471 systemd[1]: Reached target integritysetup.target. Dec 13 01:47:31.346482 systemd[1]: Reached target remote-cryptsetup.target. Dec 13 01:47:31.346494 systemd[1]: Reached target remote-fs.target. Dec 13 01:47:31.346504 systemd[1]: Reached target slices.target. Dec 13 01:47:31.346516 systemd[1]: Reached target swap.target. Dec 13 01:47:31.346526 systemd[1]: Reached target torcx.target. Dec 13 01:47:31.346556 systemd[1]: Reached target veritysetup.target. Dec 13 01:47:31.346567 systemd[1]: Listening on systemd-coredump.socket. Dec 13 01:47:31.346579 systemd[1]: Listening on systemd-initctl.socket. Dec 13 01:47:31.346589 systemd[1]: Listening on systemd-networkd.socket. Dec 13 01:47:31.346602 systemd[1]: Listening on systemd-udevd-control.socket. Dec 13 01:47:31.346617 systemd[1]: Listening on systemd-udevd-kernel.socket. Dec 13 01:47:31.346628 systemd[1]: Listening on systemd-userdbd.socket. Dec 13 01:47:31.346640 systemd[1]: Mounting dev-hugepages.mount... Dec 13 01:47:31.346651 systemd[1]: Mounting dev-mqueue.mount... Dec 13 01:47:31.346663 systemd[1]: Mounting media.mount... Dec 13 01:47:31.346677 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:31.346694 systemd[1]: Mounting sys-kernel-debug.mount... Dec 13 01:47:31.346712 systemd[1]: Mounting sys-kernel-tracing.mount... Dec 13 01:47:31.346733 systemd[1]: Mounting tmp.mount... Dec 13 01:47:31.346757 systemd[1]: Starting flatcar-tmpfiles.service... Dec 13 01:47:31.346776 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:47:31.346794 systemd[1]: Starting kmod-static-nodes.service... Dec 13 01:47:31.346813 systemd[1]: Starting modprobe@configfs.service... Dec 13 01:47:31.346832 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:47:31.346850 systemd[1]: Starting modprobe@drm.service... Dec 13 01:47:31.346871 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:47:31.346890 systemd[1]: Starting modprobe@fuse.service... Dec 13 01:47:31.346910 systemd[1]: Starting modprobe@loop.service... Dec 13 01:47:31.346934 systemd[1]: setup-nsswitch.service was skipped because of an unmet condition check (ConditionPathExists=!/etc/nsswitch.conf). Dec 13 01:47:31.346954 systemd[1]: systemd-fsck-root.service: Deactivated successfully. Dec 13 01:47:31.346972 systemd[1]: Stopped systemd-fsck-root.service. Dec 13 01:47:31.346993 systemd[1]: systemd-fsck-usr.service: Deactivated successfully. Dec 13 01:47:31.347014 systemd[1]: Stopped systemd-fsck-usr.service. Dec 13 01:47:31.347032 kernel: loop: module loaded Dec 13 01:47:31.347052 systemd[1]: Stopped systemd-journald.service. Dec 13 01:47:31.347072 kernel: fuse: init (API version 7.34) Dec 13 01:47:31.347091 systemd[1]: Starting systemd-journald.service... Dec 13 01:47:31.347112 systemd[1]: Starting systemd-modules-load.service... Dec 13 01:47:31.347134 systemd[1]: Starting systemd-network-generator.service... Dec 13 01:47:31.347153 systemd[1]: Starting systemd-remount-fs.service... Dec 13 01:47:31.347172 systemd[1]: Starting systemd-udev-trigger.service... Dec 13 01:47:31.347190 systemd[1]: verity-setup.service: Deactivated successfully. Dec 13 01:47:31.347210 systemd[1]: Stopped verity-setup.service. Dec 13 01:47:31.347228 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:31.347251 systemd-journald[1144]: Journal started Dec 13 01:47:31.347325 systemd-journald[1144]: Runtime Journal (/run/log/journal/759a267a83de401394879a2e0c6c4b53) is 8.0M, max 159.0M, 151.0M free. Dec 13 01:47:10.277000 audit: MAC_POLICY_LOAD auid=4294967295 ses=4294967295 lsm=selinux res=1 Dec 13 01:47:11.677000 audit[1]: AVC avc: denied { integrity } for pid=1 comm="systemd" lockdown_reason="/dev/mem,kmem,port" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:47:11.699000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:47:11.699000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 Dec 13 01:47:11.731000 audit: BPF prog-id=10 op=LOAD Dec 13 01:47:11.731000 audit: BPF prog-id=10 op=UNLOAD Dec 13 01:47:11.740000 audit: BPF prog-id=11 op=LOAD Dec 13 01:47:11.740000 audit: BPF prog-id=11 op=UNLOAD Dec 13 01:47:14.585000 audit[1035]: AVC avc: denied { associate } for pid=1035 comm="torcx-generator" name="docker" dev="tmpfs" ino=2 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="system_u:object_r:container_file_t:s0:c1022,c1023" Dec 13 01:47:14.585000 audit[1035]: SYSCALL arch=c000003e syscall=188 success=yes exit=0 a0=c000024302 a1=c00002a3d8 a2=c000028840 a3=32 items=0 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:14.585000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:47:14.593000 audit[1035]: AVC avc: denied { associate } for pid=1035 comm="torcx-generator" name="bin" scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 Dec 13 01:47:14.593000 audit[1035]: SYSCALL arch=c000003e syscall=258 success=yes exit=0 a0=ffffffffffffff9c a1=c0000243d9 a2=1ed a3=0 items=2 ppid=1018 pid=1035 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="torcx-generator" exe="/usr/lib/systemd/system-generators/torcx-generator" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:14.593000 audit: CWD cwd="/" Dec 13 01:47:14.593000 audit: PATH item=0 name=(null) inode=2 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:14.593000 audit: PATH item=1 name=(null) inode=3 dev=00:1c mode=040755 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:unlabeled_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:14.593000 audit: PROCTITLE proctitle=2F7573722F6C69622F73797374656D642F73797374656D2D67656E657261746F72732F746F7263782D67656E657261746F72002F72756E2F73797374656D642F67656E657261746F72002F72756E2F73797374656D642F67656E657261746F722E6561726C79002F72756E2F73797374656D642F67656E657261746F722E6C61 Dec 13 01:47:30.743000 audit: BPF prog-id=12 op=LOAD Dec 13 01:47:30.743000 audit: BPF prog-id=3 op=UNLOAD Dec 13 01:47:30.752000 audit: BPF prog-id=13 op=LOAD Dec 13 01:47:30.762000 audit: BPF prog-id=14 op=LOAD Dec 13 01:47:30.762000 audit: BPF prog-id=4 op=UNLOAD Dec 13 01:47:30.762000 audit: BPF prog-id=5 op=UNLOAD Dec 13 01:47:30.767000 audit: BPF prog-id=15 op=LOAD Dec 13 01:47:30.767000 audit: BPF prog-id=12 op=UNLOAD Dec 13 01:47:30.772000 audit: BPF prog-id=16 op=LOAD Dec 13 01:47:30.777000 audit: BPF prog-id=17 op=LOAD Dec 13 01:47:30.777000 audit: BPF prog-id=13 op=UNLOAD Dec 13 01:47:30.777000 audit: BPF prog-id=14 op=UNLOAD Dec 13 01:47:30.781000 audit: BPF prog-id=18 op=LOAD Dec 13 01:47:30.781000 audit: BPF prog-id=15 op=UNLOAD Dec 13 01:47:30.786000 audit: BPF prog-id=19 op=LOAD Dec 13 01:47:30.791000 audit: BPF prog-id=20 op=LOAD Dec 13 01:47:30.791000 audit: BPF prog-id=16 op=UNLOAD Dec 13 01:47:30.791000 audit: BPF prog-id=17 op=UNLOAD Dec 13 01:47:30.796000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:30.806000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=iscsid comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:30.807000 audit: BPF prog-id=18 op=UNLOAD Dec 13 01:47:30.818000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:30.818000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=initrd-switch-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.269000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-root comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.283000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck-usr comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.289000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.289000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.292000 audit: BPF prog-id=21 op=LOAD Dec 13 01:47:31.292000 audit: BPF prog-id=22 op=LOAD Dec 13 01:47:31.292000 audit: BPF prog-id=23 op=LOAD Dec 13 01:47:31.292000 audit: BPF prog-id=19 op=UNLOAD Dec 13 01:47:31.292000 audit: BPF prog-id=20 op=UNLOAD Dec 13 01:47:31.340000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=verity-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.340000 audit: CONFIG_CHANGE op=set audit_enabled=1 old=1 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 res=1 Dec 13 01:47:31.340000 audit[1144]: SYSCALL arch=c000003e syscall=46 success=yes exit=60 a0=6 a1=7ffdf36c5ba0 a2=4000 a3=7ffdf36c5c3c items=0 ppid=1 pid=1144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="systemd-journal" exe="/usr/lib/systemd/systemd-journald" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:31.340000 audit: PROCTITLE proctitle="/usr/lib/systemd/systemd-journald" Dec 13 01:47:30.741872 systemd[1]: Queued start job for default target multi-user.target. Dec 13 01:47:14.479975 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:47:30.792460 systemd[1]: systemd-journald.service: Deactivated successfully. Dec 13 01:47:14.480357 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:47:14.480380 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:47:14.480419 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=info msg="no vendor profile selected by /etc/flatcar/docker-1.12" Dec 13 01:47:14.480431 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="skipped missing lower profile" missing profile=oem Dec 13 01:47:14.480485 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=warning msg="no next profile: unable to read profile file: open /etc/torcx/next-profile: no such file or directory" Dec 13 01:47:14.480500 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="apply configuration parsed" lower profiles (vendor/oem)="[vendor]" upper profile (user)= Dec 13 01:47:14.480742 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="mounted tmpfs" target=/run/torcx/unpack Dec 13 01:47:14.480802 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="profile found" name=docker-1.12-no path=/usr/share/torcx/profiles/docker-1.12-no.json Dec 13 01:47:14.480820 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="profile found" name=vendor path=/usr/share/torcx/profiles/vendor.json Dec 13 01:47:14.539350 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:20.10.torcx.tgz" reference=20.10 Dec 13 01:47:14.539417 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=debug msg="new archive/reference added to cache" format=tgz name=docker path="/usr/share/torcx/store/docker:com.coreos.cl.torcx.tgz" reference=com.coreos.cl Dec 13 01:47:14.539444 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store/3510.3.6: no such file or directory" path=/usr/share/oem/torcx/store/3510.3.6 Dec 13 01:47:14.539464 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=info msg="store skipped" err="open /usr/share/oem/torcx/store: no such file or directory" path=/usr/share/oem/torcx/store Dec 13 01:47:14.539484 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store/3510.3.6: no such file or directory" path=/var/lib/torcx/store/3510.3.6 Dec 13 01:47:14.539497 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:14Z" level=info msg="store skipped" err="open /var/lib/torcx/store: no such file or directory" path=/var/lib/torcx/store Dec 13 01:47:29.194977 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:29Z" level=debug msg="image unpacked" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:47:29.195261 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:29Z" level=debug msg="binaries propagated" assets="[/bin/containerd /bin/containerd-shim /bin/ctr /bin/docker /bin/docker-containerd /bin/docker-containerd-shim /bin/docker-init /bin/docker-proxy /bin/docker-runc /bin/dockerd /bin/runc /bin/tini]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:47:29.195358 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:29Z" level=debug msg="networkd units propagated" assets="[/lib/systemd/network/50-docker.network /lib/systemd/network/90-docker-veth.network]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:47:29.195556 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:29Z" level=debug msg="systemd units propagated" assets="[/lib/systemd/system/containerd.service /lib/systemd/system/docker.service /lib/systemd/system/docker.socket /lib/systemd/system/sockets.target.wants /lib/systemd/system/multi-user.target.wants]" image=docker path=/run/torcx/unpack/docker reference=com.coreos.cl Dec 13 01:47:29.195605 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:29Z" level=debug msg="profile applied" sealed profile=/run/torcx/profile.json upper profile= Dec 13 01:47:29.195659 /usr/lib/systemd/system-generators/torcx-generator[1035]: time="2024-12-13T01:47:29Z" level=debug msg="system state sealed" content="[TORCX_LOWER_PROFILES=\"vendor\" TORCX_UPPER_PROFILE=\"\" TORCX_PROFILE_PATH=\"/run/torcx/profile.json\" TORCX_BINDIR=\"/run/torcx/bin\" TORCX_UNPACKDIR=\"/run/torcx/unpack\"]" path=/run/metadata/torcx Dec 13 01:47:31.356270 systemd[1]: Started systemd-journald.service. Dec 13 01:47:31.356000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journald comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.357158 systemd[1]: Mounted dev-hugepages.mount. Dec 13 01:47:31.359400 systemd[1]: Mounted dev-mqueue.mount. Dec 13 01:47:31.361605 systemd[1]: Mounted media.mount. Dec 13 01:47:31.363436 systemd[1]: Mounted sys-kernel-debug.mount. Dec 13 01:47:31.365738 systemd[1]: Mounted sys-kernel-tracing.mount. Dec 13 01:47:31.369151 systemd[1]: Mounted tmp.mount. Dec 13 01:47:31.372134 systemd[1]: Finished flatcar-tmpfiles.service. Dec 13 01:47:31.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=flatcar-tmpfiles comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.375603 systemd[1]: Finished kmod-static-nodes.service. Dec 13 01:47:31.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kmod-static-nodes comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.377948 systemd[1]: modprobe@configfs.service: Deactivated successfully. Dec 13 01:47:31.378088 systemd[1]: Finished modprobe@configfs.service. Dec 13 01:47:31.380000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.380000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@configfs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.380890 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:47:31.381028 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:47:31.383000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.383000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.383688 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:47:31.383823 systemd[1]: Finished modprobe@drm.service. Dec 13 01:47:31.386000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.386000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.386803 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:47:31.386950 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:47:31.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.390000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.393000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.393000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@fuse comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.397000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.397000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.401000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-network-generator comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.390980 systemd[1]: modprobe@fuse.service: Deactivated successfully. Dec 13 01:47:31.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-remount-fs comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.391177 systemd[1]: Finished modprobe@fuse.service. Dec 13 01:47:31.394238 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:47:31.394441 systemd[1]: Finished modprobe@loop.service. Dec 13 01:47:31.398389 systemd[1]: Finished systemd-network-generator.service. Dec 13 01:47:31.402408 systemd[1]: Finished systemd-remount-fs.service. Dec 13 01:47:31.409406 systemd[1]: Reached target network-pre.target. Dec 13 01:47:31.414791 systemd[1]: Mounting sys-fs-fuse-connections.mount... Dec 13 01:47:31.419005 systemd[1]: Mounting sys-kernel-config.mount... Dec 13 01:47:31.421298 systemd[1]: remount-root.service was skipped because of an unmet condition check (ConditionPathIsReadWrite=!/). Dec 13 01:47:31.425350 systemd[1]: Starting systemd-hwdb-update.service... Dec 13 01:47:31.429398 systemd[1]: Starting systemd-journal-flush.service... Dec 13 01:47:31.432547 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:47:31.433964 systemd[1]: Starting systemd-random-seed.service... Dec 13 01:47:31.436428 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:47:31.437953 systemd[1]: Starting systemd-sysusers.service... Dec 13 01:47:31.446276 systemd[1]: Mounted sys-fs-fuse-connections.mount. Dec 13 01:47:31.446739 systemd-journald[1144]: Time spent on flushing to /var/log/journal/759a267a83de401394879a2e0c6c4b53 is 20.076ms for 1165 entries. Dec 13 01:47:31.446739 systemd-journald[1144]: System Journal (/var/log/journal/759a267a83de401394879a2e0c6c4b53) is 8.0M, max 2.6G, 2.6G free. Dec 13 01:47:31.538045 systemd-journald[1144]: Received client request to flush runtime journal. Dec 13 01:47:31.456000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-modules-load comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.462000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-random-seed comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.490000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-trigger comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.454508 systemd[1]: Finished systemd-modules-load.service. Dec 13 01:47:31.457253 systemd[1]: Mounted sys-kernel-config.mount. Dec 13 01:47:31.539014 udevadm[1159]: systemd-udev-settle.service is deprecated. Please fix lvm2-activation.service, lvm2-activation-early.service not to pull it in. Dec 13 01:47:31.459986 systemd[1]: Finished systemd-random-seed.service. Dec 13 01:47:31.462652 systemd[1]: Reached target first-boot-complete.target. Dec 13 01:47:31.466523 systemd[1]: Starting systemd-sysctl.service... Dec 13 01:47:31.487737 systemd[1]: Finished systemd-udev-trigger.service. Dec 13 01:47:31.491685 systemd[1]: Starting systemd-udev-settle.service... Dec 13 01:47:31.536594 systemd[1]: Finished systemd-sysctl.service. Dec 13 01:47:31.539000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysctl comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.541000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-flush comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:31.539937 systemd[1]: Finished systemd-journal-flush.service. Dec 13 01:47:32.890174 systemd[1]: Finished systemd-sysusers.service. Dec 13 01:47:32.893000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysusers comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:33.402445 systemd[1]: Finished systemd-hwdb-update.service. Dec 13 01:47:33.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-hwdb-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:33.405000 audit: BPF prog-id=24 op=LOAD Dec 13 01:47:33.405000 audit: BPF prog-id=25 op=LOAD Dec 13 01:47:33.405000 audit: BPF prog-id=7 op=UNLOAD Dec 13 01:47:33.405000 audit: BPF prog-id=8 op=UNLOAD Dec 13 01:47:33.406809 systemd[1]: Starting systemd-udevd.service... Dec 13 01:47:33.427263 systemd-udevd[1161]: Using default interface naming scheme 'v252'. Dec 13 01:47:33.817000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udevd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:33.818000 audit: BPF prog-id=26 op=LOAD Dec 13 01:47:33.814917 systemd[1]: Started systemd-udevd.service. Dec 13 01:47:33.820389 systemd[1]: Starting systemd-networkd.service... Dec 13 01:47:33.877529 systemd[1]: Condition check resulted in dev-ttyS0.device being skipped. Dec 13 01:47:33.950835 kernel: hv_utils: Registering HyperV Utility Driver Dec 13 01:47:33.950945 kernel: hv_vmbus: registering driver hv_utils Dec 13 01:47:33.963436 kernel: hv_utils: Heartbeat IC version 3.0 Dec 13 01:47:33.963516 kernel: hv_utils: Shutdown IC version 3.2 Dec 13 01:47:33.963566 kernel: hv_utils: TimeSync IC version 4.0 Dec 13 01:47:33.941000 audit[1170]: AVC avc: denied { confidentiality } for pid=1170 comm="(udev-worker)" lockdown_reason="use of tracefs" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=1 Dec 13 01:47:33.984418 systemd-journald[1144]: Time jumped backwards, rotating. Dec 13 01:47:33.984527 kernel: mousedev: PS/2 mouse device common for all mice Dec 13 01:47:33.984551 kernel: hv_vmbus: registering driver hyperv_fb Dec 13 01:47:33.984571 kernel: hv_vmbus: registering driver hv_balloon Dec 13 01:47:33.984591 kernel: hyperv_fb: Synthvid Version major 3, minor 5 Dec 13 01:47:33.984612 kernel: hyperv_fb: Screen resolution: 1024x768, Color depth: 32, Frame buffer size: 8388608 Dec 13 01:47:33.984635 kernel: hv_balloon: Using Dynamic Memory protocol version 2.0 Dec 13 01:47:33.984655 kernel: Console: switching to colour dummy device 80x25 Dec 13 01:47:33.984674 kernel: Console: switching to colour frame buffer device 128x48 Dec 13 01:47:33.941000 audit[1170]: SYSCALL arch=c000003e syscall=175 success=yes exit=0 a0=5608ca199b60 a1=f884 a2=7fab04420bc5 a3=5 items=12 ppid=1161 pid=1170 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="(udev-worker)" exe="/usr/bin/udevadm" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:33.941000 audit: CWD cwd="/" Dec 13 01:47:33.941000 audit: PATH item=0 name=(null) inode=1237 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=1 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=2 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=3 name=(null) inode=14208 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=4 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=5 name=(null) inode=14209 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=6 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=7 name=(null) inode=14210 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=8 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=9 name=(null) inode=14211 dev=00:0b mode=0100640 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=10 name=(null) inode=14207 dev=00:0b mode=040750 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=PARENT cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PATH item=11 name=(null) inode=14212 dev=00:0b mode=0100440 ouid=0 ogid=0 rdev=00:00 obj=system_u:object_r:tracefs_t:s0 nametype=CREATE cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:47:33.941000 audit: PROCTITLE proctitle="(udev-worker)" Dec 13 01:47:34.014000 audit: BPF prog-id=27 op=LOAD Dec 13 01:47:34.015000 audit: BPF prog-id=28 op=LOAD Dec 13 01:47:34.015000 audit: BPF prog-id=29 op=LOAD Dec 13 01:47:34.016889 systemd[1]: Starting systemd-userdbd.service... Dec 13 01:47:34.079000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-userdbd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:34.077400 systemd[1]: Started systemd-userdbd.service. Dec 13 01:47:34.163933 kernel: KVM: vmx: using Hyper-V Enlightened VMCS Dec 13 01:47:34.218422 kernel: BTRFS info: devid 1 device path /dev/disk/by-label/OEM changed to /dev/sda6 scanned by (udev-worker) (1177) Dec 13 01:47:34.251187 systemd[1]: Found device dev-disk-by\x2dlabel-OEM.device. Dec 13 01:47:34.255241 systemd[1]: Finished systemd-udev-settle.service. Dec 13 01:47:34.256000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-udev-settle comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:34.258932 systemd[1]: Starting lvm2-activation-early.service... Dec 13 01:47:34.654807 systemd-networkd[1173]: lo: Link UP Dec 13 01:47:34.654818 systemd-networkd[1173]: lo: Gained carrier Dec 13 01:47:34.655556 systemd-networkd[1173]: Enumeration completed Dec 13 01:47:34.655695 systemd[1]: Started systemd-networkd.service. Dec 13 01:47:34.658000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:34.660235 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:47:34.716347 systemd-networkd[1173]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:47:34.770935 kernel: mlx5_core a352:00:02.0 enP41810s1: Link up Dec 13 01:47:34.792933 kernel: hv_netvsc 7c1e5287-e33c-7c1e-5287-e33c7c1e5287 eth0: Data path switched to VF: enP41810s1 Dec 13 01:47:34.793497 systemd-networkd[1173]: enP41810s1: Link UP Dec 13 01:47:34.793741 systemd-networkd[1173]: eth0: Link UP Dec 13 01:47:34.793823 systemd-networkd[1173]: eth0: Gained carrier Dec 13 01:47:34.800183 systemd-networkd[1173]: enP41810s1: Gained carrier Dec 13 01:47:34.820021 systemd-networkd[1173]: eth0: DHCPv4 address 10.200.8.26/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:47:34.897782 lvm[1237]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:47:34.924149 systemd[1]: Finished lvm2-activation-early.service. Dec 13 01:47:34.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation-early comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:34.928270 systemd[1]: Reached target cryptsetup.target. Dec 13 01:47:34.932701 systemd[1]: Starting lvm2-activation.service... Dec 13 01:47:34.938627 lvm[1240]: WARNING: Failed to connect to lvmetad. Falling back to device scanning. Dec 13 01:47:34.957705 systemd[1]: Finished lvm2-activation.service. Dec 13 01:47:34.960000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=lvm2-activation comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:34.961330 systemd[1]: Reached target local-fs-pre.target. Dec 13 01:47:34.964174 systemd[1]: var-lib-machines.mount was skipped because of an unmet condition check (ConditionPathExists=/var/lib/machines.raw). Dec 13 01:47:34.964212 systemd[1]: Reached target local-fs.target. Dec 13 01:47:34.967224 systemd[1]: Reached target machines.target. Dec 13 01:47:34.971094 systemd[1]: Starting ldconfig.service... Dec 13 01:47:34.975619 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:47:34.975718 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:34.976854 systemd[1]: Starting systemd-boot-update.service... Dec 13 01:47:34.980977 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-OEM.service... Dec 13 01:47:34.985601 systemd[1]: Starting systemd-machine-id-commit.service... Dec 13 01:47:34.990023 systemd[1]: Starting systemd-sysext.service... Dec 13 01:47:35.079822 systemd[1]: boot.automount: Got automount request for /boot, triggered by 1242 (bootctl) Dec 13 01:47:35.081261 systemd[1]: Starting systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service... Dec 13 01:47:35.486000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-OEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.487432 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-OEM.service. Dec 13 01:47:35.562051 systemd[1]: Unmounting usr-share-oem.mount... Dec 13 01:47:35.593159 systemd[1]: etc-machine\x2did.mount: Deactivated successfully. Dec 13 01:47:35.594202 systemd[1]: Finished systemd-machine-id-commit.service. Dec 13 01:47:35.593000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-machine-id-commit comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.802422 systemd[1]: usr-share-oem.mount: Deactivated successfully. Dec 13 01:47:35.802640 systemd[1]: Unmounted usr-share-oem.mount. Dec 13 01:47:35.816926 kernel: loop0: detected capacity change from 0 to 205544 Dec 13 01:47:35.862931 kernel: squashfs: version 4.0 (2009/01/31) Phillip Lougher Dec 13 01:47:35.876930 kernel: loop1: detected capacity change from 0 to 205544 Dec 13 01:47:35.883481 (sd-sysext)[1254]: Using extensions 'kubernetes'. Dec 13 01:47:35.884033 (sd-sysext)[1254]: Merged extensions into '/usr'. Dec 13 01:47:35.904074 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:35.905494 systemd[1]: Mounting usr-share-oem.mount... Dec 13 01:47:35.908243 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:47:35.909852 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:47:35.913457 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:47:35.916688 systemd[1]: Starting modprobe@loop.service... Dec 13 01:47:35.918941 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:47:35.919105 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:35.919260 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:35.921848 systemd[1]: Mounted usr-share-oem.mount. Dec 13 01:47:35.925293 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:47:35.925437 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:47:35.927000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.928480 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:47:35.928586 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:47:35.931285 kernel: kauditd_printk_skb: 82 callbacks suppressed Dec 13 01:47:35.931357 kernel: audit: type=1130 audit(1734054455.927:165): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.927000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.945958 kernel: audit: type=1131 audit(1734054455.927:166): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.965000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.969967 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:47:35.970138 systemd[1]: Finished modprobe@loop.service. Dec 13 01:47:35.965000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.993534 kernel: audit: type=1130 audit(1734054455.965:167): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.993609 kernel: audit: type=1131 audit(1734054455.965:168): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.992000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.995672 systemd[1]: Finished systemd-sysext.service. Dec 13 01:47:36.006280 kernel: audit: type=1130 audit(1734054455.992:169): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.006346 kernel: audit: type=1131 audit(1734054455.992:170): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:35.992000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.018000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.021639 systemd[1]: Starting ensure-sysext.service... Dec 13 01:47:36.035187 kernel: audit: type=1130 audit(1734054456.018:171): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.030154 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:47:36.030220 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.032321 systemd[1]: Starting systemd-tmpfiles-setup.service... Dec 13 01:47:36.035940 systemd[1]: Reloading. Dec 13 01:47:36.093951 /usr/lib/systemd/system-generators/torcx-generator[1280]: time="2024-12-13T01:47:36Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:47:36.093988 /usr/lib/systemd/system-generators/torcx-generator[1280]: time="2024-12-13T01:47:36Z" level=info msg="torcx already run" Dec 13 01:47:36.120002 systemd-tmpfiles[1261]: /usr/lib/tmpfiles.d/legacy.conf:13: Duplicate line for path "/run/lock", ignoring. Dec 13 01:47:36.145750 systemd-tmpfiles[1261]: /usr/lib/tmpfiles.d/provision.conf:20: Duplicate line for path "/root", ignoring. Dec 13 01:47:36.164763 systemd-tmpfiles[1261]: /usr/lib/tmpfiles.d/systemd.conf:29: Duplicate line for path "/var/lib/systemd", ignoring. Dec 13 01:47:36.199668 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:47:36.199689 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:47:36.217182 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:47:36.255669 systemd-fsck[1249]: fsck.fat 4.2 (2021-01-31) Dec 13 01:47:36.255669 systemd-fsck[1249]: /dev/sda1: 789 files, 119291/258078 clusters Dec 13 01:47:36.315691 kernel: audit: type=1334 audit(1734054456.304:172): prog-id=30 op=LOAD Dec 13 01:47:36.315832 kernel: audit: type=1334 audit(1734054456.304:173): prog-id=26 op=UNLOAD Dec 13 01:47:36.304000 audit: BPF prog-id=30 op=LOAD Dec 13 01:47:36.304000 audit: BPF prog-id=26 op=UNLOAD Dec 13 01:47:36.309000 audit: BPF prog-id=31 op=LOAD Dec 13 01:47:36.309000 audit: BPF prog-id=32 op=LOAD Dec 13 01:47:36.309000 audit: BPF prog-id=24 op=UNLOAD Dec 13 01:47:36.309000 audit: BPF prog-id=25 op=UNLOAD Dec 13 01:47:36.321925 kernel: audit: type=1334 audit(1734054456.309:174): prog-id=31 op=LOAD Dec 13 01:47:36.314000 audit: BPF prog-id=33 op=LOAD Dec 13 01:47:36.314000 audit: BPF prog-id=27 op=UNLOAD Dec 13 01:47:36.314000 audit: BPF prog-id=34 op=LOAD Dec 13 01:47:36.314000 audit: BPF prog-id=35 op=LOAD Dec 13 01:47:36.314000 audit: BPF prog-id=28 op=UNLOAD Dec 13 01:47:36.314000 audit: BPF prog-id=29 op=UNLOAD Dec 13 01:47:36.321000 audit: BPF prog-id=36 op=LOAD Dec 13 01:47:36.321000 audit: BPF prog-id=21 op=UNLOAD Dec 13 01:47:36.321000 audit: BPF prog-id=37 op=LOAD Dec 13 01:47:36.321000 audit: BPF prog-id=38 op=LOAD Dec 13 01:47:36.321000 audit: BPF prog-id=22 op=UNLOAD Dec 13 01:47:36.321000 audit: BPF prog-id=23 op=UNLOAD Dec 13 01:47:36.330179 systemd[1]: Finished systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM.service. Dec 13 01:47:36.332000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-fsck@dev-disk-by\x2dlabel-EFI\x2dSYSTEM comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.340885 systemd[1]: Mounting boot.mount... Dec 13 01:47:36.347312 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:36.347594 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.349106 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:47:36.353655 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:47:36.357234 systemd[1]: Starting modprobe@loop.service... Dec 13 01:47:36.359452 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.359611 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:36.359751 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:36.362696 systemd[1]: Mounted boot.mount. Dec 13 01:47:36.370559 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:47:36.370712 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:47:36.372000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.372000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.372986 systemd-networkd[1173]: eth0: Gained IPv6LL Dec 13 01:47:36.373298 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:47:36.373451 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:47:36.375000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.375000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.376136 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:47:36.376282 systemd[1]: Finished modprobe@loop.service. Dec 13 01:47:36.377000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.377000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.378707 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:47:36.378832 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.379389 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:47:36.381000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-networkd-wait-online comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.384422 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.386087 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:47:36.389854 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:47:36.393802 systemd[1]: Starting modprobe@loop.service... Dec 13 01:47:36.396174 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.396388 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:36.397682 systemd[1]: Finished systemd-boot-update.service. Dec 13 01:47:36.400000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-boot-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.401561 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:47:36.401720 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:47:36.403000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.403000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.405117 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:47:36.405280 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:47:36.407000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.407000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.408862 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:47:36.409077 systemd[1]: Finished modprobe@loop.service. Dec 13 01:47:36.410000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.411000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.412440 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:47:36.412583 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.417459 systemd[1]: ignition-delete-config.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.419682 systemd[1]: Starting modprobe@dm_mod.service... Dec 13 01:47:36.423798 systemd[1]: Starting modprobe@drm.service... Dec 13 01:47:36.427697 systemd[1]: Starting modprobe@efi_pstore.service... Dec 13 01:47:36.431555 systemd[1]: Starting modprobe@loop.service... Dec 13 01:47:36.434009 systemd[1]: systemd-binfmt.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.434181 systemd[1]: systemd-boot-system-token.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/LoaderFeatures-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:36.435822 systemd[1]: modprobe@dm_mod.service: Deactivated successfully. Dec 13 01:47:36.436005 systemd[1]: Finished modprobe@dm_mod.service. Dec 13 01:47:36.437000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.437000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@dm_mod comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.439376 systemd[1]: modprobe@drm.service: Deactivated successfully. Dec 13 01:47:36.439547 systemd[1]: Finished modprobe@drm.service. Dec 13 01:47:36.441000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.441000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@drm comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.442820 systemd[1]: modprobe@efi_pstore.service: Deactivated successfully. Dec 13 01:47:36.443007 systemd[1]: Finished modprobe@efi_pstore.service. Dec 13 01:47:36.444000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.445000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@efi_pstore comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.446356 systemd[1]: modprobe@loop.service: Deactivated successfully. Dec 13 01:47:36.446522 systemd[1]: Finished modprobe@loop.service. Dec 13 01:47:36.448000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.448000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=modprobe@loop comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.451306 systemd[1]: Finished ensure-sysext.service. Dec 13 01:47:36.452000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=ensure-sysext comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.455204 systemd[1]: systemd-pstore.service was skipped because of an unmet condition check (ConditionDirectoryNotEmpty=/sys/fs/pstore). Dec 13 01:47:36.455259 systemd[1]: systemd-repart.service was skipped because no trigger condition checks were met. Dec 13 01:47:36.572816 systemd[1]: Finished systemd-tmpfiles-setup.service. Dec 13 01:47:36.575000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-tmpfiles-setup comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.577445 systemd[1]: Starting audit-rules.service... Dec 13 01:47:36.581062 systemd[1]: Starting clean-ca-certificates.service... Dec 13 01:47:36.585775 systemd[1]: Starting systemd-journal-catalog-update.service... Dec 13 01:47:36.589000 audit: BPF prog-id=39 op=LOAD Dec 13 01:47:36.591786 systemd[1]: Starting systemd-resolved.service... Dec 13 01:47:36.596000 audit: BPF prog-id=40 op=LOAD Dec 13 01:47:36.598233 systemd[1]: Starting systemd-timesyncd.service... Dec 13 01:47:36.602171 systemd[1]: Starting systemd-update-utmp.service... Dec 13 01:47:36.606159 systemd[1]: proc-xen.mount was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:36.606210 systemd[1]: xenserver-pv-version.service was skipped because of an unmet condition check (ConditionVirtualization=xen). Dec 13 01:47:36.645000 audit[1363]: SYSTEM_BOOT pid=1363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg=' comm="systemd-update-utmp" exe="/usr/lib/systemd/systemd-update-utmp" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.651999 systemd[1]: Finished systemd-update-utmp.service. Dec 13 01:47:36.656000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-update-utmp comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.667259 systemd[1]: Finished clean-ca-certificates.service. Dec 13 01:47:36.673000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=clean-ca-certificates comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.674553 systemd[1]: update-ca-certificates.service was skipped because of an unmet condition check (ConditionPathIsSymbolicLink=!/etc/ssl/certs/ca-certificates.crt). Dec 13 01:47:36.713275 systemd[1]: Started systemd-timesyncd.service. Dec 13 01:47:36.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-timesyncd comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.716462 systemd[1]: Reached target time-set.target. Dec 13 01:47:36.733440 systemd-resolved[1361]: Positive Trust Anchors: Dec 13 01:47:36.733460 systemd-resolved[1361]: . IN DS 20326 8 2 e06d44b80b8f1d39a95c0b0d7c65d08458e880409bbc683457104237c7f8ec8d Dec 13 01:47:36.733513 systemd-resolved[1361]: Negative trust anchors: home.arpa 10.in-addr.arpa 16.172.in-addr.arpa 17.172.in-addr.arpa 18.172.in-addr.arpa 19.172.in-addr.arpa 20.172.in-addr.arpa 21.172.in-addr.arpa 22.172.in-addr.arpa 23.172.in-addr.arpa 24.172.in-addr.arpa 25.172.in-addr.arpa 26.172.in-addr.arpa 27.172.in-addr.arpa 28.172.in-addr.arpa 29.172.in-addr.arpa 30.172.in-addr.arpa 31.172.in-addr.arpa 168.192.in-addr.arpa d.f.ip6.arpa corp home internal intranet lan local private test Dec 13 01:47:36.749556 systemd[1]: Finished systemd-journal-catalog-update.service. Dec 13 01:47:36.752000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-journal-catalog-update comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.882615 systemd-timesyncd[1362]: Contacted time server 188.125.64.7:123 (0.flatcar.pool.ntp.org). Dec 13 01:47:36.882838 systemd-timesyncd[1362]: Initial clock synchronization to Fri 2024-12-13 01:47:36.872799 UTC. Dec 13 01:47:36.896470 systemd-resolved[1361]: Using system hostname 'ci-3510.3.6-a-92bad84337'. Dec 13 01:47:36.898046 systemd[1]: Started systemd-resolved.service. Dec 13 01:47:36.900000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=systemd-resolved comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:47:36.901017 systemd[1]: Reached target network.target. Dec 13 01:47:36.903578 systemd[1]: Reached target network-online.target. Dec 13 01:47:36.906709 systemd[1]: Reached target nss-lookup.target. Dec 13 01:47:37.169000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=add_rule key=(null) list=5 res=1 Dec 13 01:47:37.169000 audit[1379]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffc67016650 a2=420 a3=0 items=0 ppid=1358 pid=1379 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:47:37.169000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D52002F6574632F61756469742F61756469742E72756C6573 Dec 13 01:47:37.171044 augenrules[1379]: No rules Dec 13 01:47:37.172034 systemd[1]: Finished audit-rules.service. Dec 13 01:47:47.694166 ldconfig[1241]: /sbin/ldconfig: /lib/ld.so.conf is not an ELF file - it has the wrong magic bytes at the start. Dec 13 01:47:47.702496 systemd[1]: Finished ldconfig.service. Dec 13 01:47:47.707040 systemd[1]: Starting systemd-update-done.service... Dec 13 01:47:47.778590 systemd[1]: Finished systemd-update-done.service. Dec 13 01:47:47.781649 systemd[1]: Reached target sysinit.target. Dec 13 01:47:47.784513 systemd[1]: Started motdgen.path. Dec 13 01:47:47.786694 systemd[1]: Started user-cloudinit@var-lib-flatcar\x2dinstall-user_data.path. Dec 13 01:47:47.790547 systemd[1]: Started logrotate.timer. Dec 13 01:47:47.799392 systemd[1]: Started mdadm.timer. Dec 13 01:47:47.801420 systemd[1]: Started systemd-tmpfiles-clean.timer. Dec 13 01:47:47.804249 systemd[1]: update-engine-stub.timer was skipped because of an unmet condition check (ConditionPathExists=/usr/.noupdate). Dec 13 01:47:47.804302 systemd[1]: Reached target paths.target. Dec 13 01:47:47.806503 systemd[1]: Reached target timers.target. Dec 13 01:47:47.810475 systemd[1]: Listening on dbus.socket. Dec 13 01:47:47.813720 systemd[1]: Starting docker.socket... Dec 13 01:47:47.820167 systemd[1]: Listening on sshd.socket. Dec 13 01:47:47.823072 systemd[1]: systemd-pcrphase-sysinit.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:47.823558 systemd[1]: Listening on docker.socket. Dec 13 01:47:47.826016 systemd[1]: Reached target sockets.target. Dec 13 01:47:47.828462 systemd[1]: Reached target basic.target. Dec 13 01:47:47.830892 systemd[1]: addon-config@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:47:47.830944 systemd[1]: addon-run@usr-share-oem.service was skipped because no trigger condition checks were met. Dec 13 01:47:47.831956 systemd[1]: Starting containerd.service... Dec 13 01:47:47.836528 systemd[1]: Starting dbus.service... Dec 13 01:47:47.840065 systemd[1]: Starting enable-oem-cloudinit.service... Dec 13 01:47:47.843678 systemd[1]: Starting extend-filesystems.service... Dec 13 01:47:47.846040 systemd[1]: flatcar-setup-environment.service was skipped because of an unmet condition check (ConditionPathExists=/usr/share/oem/bin/flatcar-setup-environment). Dec 13 01:47:47.858700 systemd[1]: Starting kubelet.service... Dec 13 01:47:47.862012 systemd[1]: Starting motdgen.service... Dec 13 01:47:47.865041 systemd[1]: Started nvidia.service. Dec 13 01:47:47.868664 systemd[1]: Starting prepare-helm.service... Dec 13 01:47:47.872630 systemd[1]: Starting ssh-key-proc-cmdline.service... Dec 13 01:47:47.877328 systemd[1]: Starting sshd-keygen.service... Dec 13 01:47:47.885627 systemd[1]: Starting systemd-logind.service... Dec 13 01:47:47.894438 systemd[1]: systemd-pcrphase.service was skipped because of an unmet condition check (ConditionPathExists=/sys/firmware/efi/efivars/StubPcrKernelImage-4a67b082-0a4c-41cf-b6c7-440b29bb8c4f). Dec 13 01:47:47.894560 systemd[1]: tcsd.service was skipped because of an unmet condition check (ConditionPathExists=/dev/tpm0). Dec 13 01:47:47.897619 systemd[1]: cgroup compatibility translation between legacy and unified hierarchy settings activated. See cgroup-compat debug messages for details. Dec 13 01:47:47.901389 systemd[1]: Starting update-engine.service... Dec 13 01:47:47.907520 systemd[1]: Starting update-ssh-keys-after-ignition.service... Dec 13 01:47:47.914781 systemd[1]: ssh-key-proc-cmdline.service: Deactivated successfully. Dec 13 01:47:47.915345 systemd[1]: Finished ssh-key-proc-cmdline.service. Dec 13 01:47:47.941960 jq[1389]: false Dec 13 01:47:47.944039 jq[1407]: true Dec 13 01:47:47.942457 systemd[1]: enable-oem-cloudinit.service: Skipped due to 'exec-condition'. Dec 13 01:47:47.942665 systemd[1]: Condition check resulted in enable-oem-cloudinit.service being skipped. Dec 13 01:47:47.955729 systemd[1]: motdgen.service: Deactivated successfully. Dec 13 01:47:47.956010 systemd[1]: Finished motdgen.service. Dec 13 01:47:47.969722 jq[1420]: true Dec 13 01:47:47.977183 extend-filesystems[1390]: Found loop1 Dec 13 01:47:47.977183 extend-filesystems[1390]: Found sda Dec 13 01:47:47.977183 extend-filesystems[1390]: Found sda1 Dec 13 01:47:47.977183 extend-filesystems[1390]: Found sda2 Dec 13 01:47:47.977183 extend-filesystems[1390]: Found sda3 Dec 13 01:47:47.977183 extend-filesystems[1390]: Found usr Dec 13 01:47:47.977183 extend-filesystems[1390]: Found sda4 Dec 13 01:47:47.977183 extend-filesystems[1390]: Found sda6 Dec 13 01:47:47.977183 extend-filesystems[1390]: Found sda7 Dec 13 01:47:47.977183 extend-filesystems[1390]: Found sda9 Dec 13 01:47:47.977183 extend-filesystems[1390]: Checking size of /dev/sda9 Dec 13 01:47:48.010615 env[1412]: time="2024-12-13T01:47:48.010557824Z" level=info msg="starting containerd" revision=92b3a9d6f1b3bcc6dc74875cfdea653fe39f09c2 version=1.6.16 Dec 13 01:47:48.030803 env[1412]: time="2024-12-13T01:47:48.030754010Z" level=info msg="loading plugin \"io.containerd.content.v1.content\"..." type=io.containerd.content.v1 Dec 13 01:47:48.031122 env[1412]: time="2024-12-13T01:47:48.031098208Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.aufs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:48.032825 env[1412]: time="2024-12-13T01:47:48.032784006Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.aufs\"..." error="aufs is not supported (modprobe aufs failed: exit status 1 \"modprobe: FATAL: Module aufs not found in directory /lib/modules/5.15.173-flatcar\\n\"): skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:47:48.032979 env[1412]: time="2024-12-13T01:47:48.032959254Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:48.033352 env[1412]: time="2024-12-13T01:47:48.033324345Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.btrfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.btrfs (ext4) must be a btrfs filesystem to be used with the btrfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:47:48.033463 env[1412]: time="2024-12-13T01:47:48.033445709Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.devmapper\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:48.033544 env[1412]: time="2024-12-13T01:47:48.033526785Z" level=warning msg="failed to load plugin io.containerd.snapshotter.v1.devmapper" error="devmapper not configured" Dec 13 01:47:48.033608 env[1412]: time="2024-12-13T01:47:48.033593565Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.native\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:48.033774 env[1412]: time="2024-12-13T01:47:48.033752118Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.overlayfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:48.034161 env[1412]: time="2024-12-13T01:47:48.034142601Z" level=info msg="loading plugin \"io.containerd.snapshotter.v1.zfs\"..." type=io.containerd.snapshotter.v1 Dec 13 01:47:48.034366 env[1412]: time="2024-12-13T01:47:48.034349540Z" level=info msg="skip loading plugin \"io.containerd.snapshotter.v1.zfs\"..." error="path /var/lib/containerd/io.containerd.snapshotter.v1.zfs must be a zfs filesystem to be used with the zfs snapshotter: skip plugin" type=io.containerd.snapshotter.v1 Dec 13 01:47:48.034431 env[1412]: time="2024-12-13T01:47:48.034415920Z" level=info msg="loading plugin \"io.containerd.metadata.v1.bolt\"..." type=io.containerd.metadata.v1 Dec 13 01:47:48.034551 env[1412]: time="2024-12-13T01:47:48.034534385Z" level=warning msg="could not use snapshotter devmapper in metadata plugin" error="devmapper not configured" Dec 13 01:47:48.034624 env[1412]: time="2024-12-13T01:47:48.034611262Z" level=info msg="metadata content store policy set" policy=shared Dec 13 01:47:48.052639 systemd-logind[1399]: Watching system buttons on /dev/input/event0 (AT Translated Set 2 keyboard) Dec 13 01:47:48.059476 systemd-logind[1399]: New seat seat0. Dec 13 01:47:48.069258 env[1412]: time="2024-12-13T01:47:48.069211659Z" level=info msg="loading plugin \"io.containerd.differ.v1.walking\"..." type=io.containerd.differ.v1 Dec 13 01:47:48.069345 env[1412]: time="2024-12-13T01:47:48.069263644Z" level=info msg="loading plugin \"io.containerd.event.v1.exchange\"..." type=io.containerd.event.v1 Dec 13 01:47:48.069345 env[1412]: time="2024-12-13T01:47:48.069282438Z" level=info msg="loading plugin \"io.containerd.gc.v1.scheduler\"..." type=io.containerd.gc.v1 Dec 13 01:47:48.069345 env[1412]: time="2024-12-13T01:47:48.069320427Z" level=info msg="loading plugin \"io.containerd.service.v1.introspection-service\"..." type=io.containerd.service.v1 Dec 13 01:47:48.069446 env[1412]: time="2024-12-13T01:47:48.069343320Z" level=info msg="loading plugin \"io.containerd.service.v1.containers-service\"..." type=io.containerd.service.v1 Dec 13 01:47:48.069446 env[1412]: time="2024-12-13T01:47:48.069363414Z" level=info msg="loading plugin \"io.containerd.service.v1.content-service\"..." type=io.containerd.service.v1 Dec 13 01:47:48.069446 env[1412]: time="2024-12-13T01:47:48.069382308Z" level=info msg="loading plugin \"io.containerd.service.v1.diff-service\"..." type=io.containerd.service.v1 Dec 13 01:47:48.069446 env[1412]: time="2024-12-13T01:47:48.069400603Z" level=info msg="loading plugin \"io.containerd.service.v1.images-service\"..." type=io.containerd.service.v1 Dec 13 01:47:48.069446 env[1412]: time="2024-12-13T01:47:48.069418697Z" level=info msg="loading plugin \"io.containerd.service.v1.leases-service\"..." type=io.containerd.service.v1 Dec 13 01:47:48.069677 env[1412]: time="2024-12-13T01:47:48.069443590Z" level=info msg="loading plugin \"io.containerd.service.v1.namespaces-service\"..." type=io.containerd.service.v1 Dec 13 01:47:48.069677 env[1412]: time="2024-12-13T01:47:48.069462184Z" level=info msg="loading plugin \"io.containerd.service.v1.snapshots-service\"..." type=io.containerd.service.v1 Dec 13 01:47:48.069677 env[1412]: time="2024-12-13T01:47:48.069482078Z" level=info msg="loading plugin \"io.containerd.runtime.v1.linux\"..." type=io.containerd.runtime.v1 Dec 13 01:47:48.069677 env[1412]: time="2024-12-13T01:47:48.069611840Z" level=info msg="loading plugin \"io.containerd.runtime.v2.task\"..." type=io.containerd.runtime.v2 Dec 13 01:47:48.069817 env[1412]: time="2024-12-13T01:47:48.069708511Z" level=info msg="loading plugin \"io.containerd.monitor.v1.cgroups\"..." type=io.containerd.monitor.v1 Dec 13 01:47:48.070118 env[1412]: time="2024-12-13T01:47:48.070086998Z" level=info msg="loading plugin \"io.containerd.service.v1.tasks-service\"..." type=io.containerd.service.v1 Dec 13 01:47:48.070179 env[1412]: time="2024-12-13T01:47:48.070133784Z" level=info msg="loading plugin \"io.containerd.grpc.v1.introspection\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070179 env[1412]: time="2024-12-13T01:47:48.070153379Z" level=info msg="loading plugin \"io.containerd.internal.v1.restart\"..." type=io.containerd.internal.v1 Dec 13 01:47:48.070246 env[1412]: time="2024-12-13T01:47:48.070216160Z" level=info msg="loading plugin \"io.containerd.grpc.v1.containers\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070246 env[1412]: time="2024-12-13T01:47:48.070235654Z" level=info msg="loading plugin \"io.containerd.grpc.v1.content\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070326 env[1412]: time="2024-12-13T01:47:48.070253549Z" level=info msg="loading plugin \"io.containerd.grpc.v1.diff\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070326 env[1412]: time="2024-12-13T01:47:48.070271044Z" level=info msg="loading plugin \"io.containerd.grpc.v1.events\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070326 env[1412]: time="2024-12-13T01:47:48.070288738Z" level=info msg="loading plugin \"io.containerd.grpc.v1.healthcheck\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070326 env[1412]: time="2024-12-13T01:47:48.070305933Z" level=info msg="loading plugin \"io.containerd.grpc.v1.images\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070326 env[1412]: time="2024-12-13T01:47:48.070323128Z" level=info msg="loading plugin \"io.containerd.grpc.v1.leases\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070485 env[1412]: time="2024-12-13T01:47:48.070339423Z" level=info msg="loading plugin \"io.containerd.grpc.v1.namespaces\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070485 env[1412]: time="2024-12-13T01:47:48.070361117Z" level=info msg="loading plugin \"io.containerd.internal.v1.opt\"..." type=io.containerd.internal.v1 Dec 13 01:47:48.070570 env[1412]: time="2024-12-13T01:47:48.070509772Z" level=info msg="loading plugin \"io.containerd.grpc.v1.snapshots\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070570 env[1412]: time="2024-12-13T01:47:48.070555359Z" level=info msg="loading plugin \"io.containerd.grpc.v1.tasks\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070643 env[1412]: time="2024-12-13T01:47:48.070578152Z" level=info msg="loading plugin \"io.containerd.grpc.v1.version\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.070643 env[1412]: time="2024-12-13T01:47:48.070595247Z" level=info msg="loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." type=io.containerd.tracing.processor.v1 Dec 13 01:47:48.070643 env[1412]: time="2024-12-13T01:47:48.070617041Z" level=info msg="skip loading plugin \"io.containerd.tracing.processor.v1.otlp\"..." error="no OpenTelemetry endpoint: skip plugin" type=io.containerd.tracing.processor.v1 Dec 13 01:47:48.070643 env[1412]: time="2024-12-13T01:47:48.070635635Z" level=info msg="loading plugin \"io.containerd.internal.v1.tracing\"..." type=io.containerd.internal.v1 Dec 13 01:47:48.070772 env[1412]: time="2024-12-13T01:47:48.070659728Z" level=error msg="failed to initialize a tracing processor \"otlp\"" error="no OpenTelemetry endpoint: skip plugin" Dec 13 01:47:48.070772 env[1412]: time="2024-12-13T01:47:48.070701415Z" level=info msg="loading plugin \"io.containerd.grpc.v1.cri\"..." type=io.containerd.grpc.v1 Dec 13 01:47:48.071045 env[1412]: time="2024-12-13T01:47:48.070975634Z" level=info msg="Start cri plugin with config {PluginConfig:{ContainerdConfig:{Snapshotter:overlayfs DefaultRuntimeName:runc DefaultRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} UntrustedWorkloadRuntime:{Type: Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0} Runtimes:map[runc:{Type:io.containerd.runc.v2 Path: Engine: PodAnnotations:[] ContainerAnnotations:[] Root: Options:map[SystemdCgroup:true] PrivilegedWithoutHostDevices:false BaseRuntimeSpec: NetworkPluginConfDir: NetworkPluginMaxConfNum:0}] NoPivot:false DisableSnapshotAnnotations:true DiscardUnpackedLayers:false IgnoreRdtNotEnabledErrors:false} CniConfig:{NetworkPluginBinDir:/opt/cni/bin NetworkPluginConfDir:/etc/cni/net.d NetworkPluginMaxConfNum:1 NetworkPluginConfTemplate: IPPreference:} Registry:{ConfigPath: Mirrors:map[] Configs:map[] Auths:map[] Headers:map[]} ImageDecryption:{KeyModel:node} DisableTCPService:true StreamServerAddress:127.0.0.1 StreamServerPort:0 StreamIdleTimeout:4h0m0s EnableSelinux:true SelinuxCategoryRange:1024 SandboxImage:registry.k8s.io/pause:3.6 StatsCollectPeriod:10 SystemdCgroup:false EnableTLSStreaming:false X509KeyPairStreaming:{TLSCertFile: TLSKeyFile:} MaxContainerLogLineSize:16384 DisableCgroup:false DisableApparmor:false RestrictOOMScoreAdj:false MaxConcurrentDownloads:3 DisableProcMount:false UnsetSeccompProfile: TolerateMissingHugetlbController:true DisableHugetlbController:true DeviceOwnershipFromSecurityContext:false IgnoreImageDefinedVolumes:false NetNSMountsUnderStateDir:false EnableUnprivilegedPorts:false EnableUnprivilegedICMP:false} ContainerdRootDir:/var/lib/containerd ContainerdEndpoint:/run/containerd/containerd.sock RootDir:/var/lib/containerd/io.containerd.grpc.v1.cri StateDir:/run/containerd/io.containerd.grpc.v1.cri}" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.071059609Z" level=info msg="Connect containerd service" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.071106195Z" level=info msg="Get image filesystem path \"/var/lib/containerd/io.containerd.snapshotter.v1.overlayfs\"" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.075103605Z" level=error msg="failed to load cni during init, please check CRI plugin status before setting up network for pods" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.075452601Z" level=info msg=serving... address=/run/containerd/containerd.sock.ttrpc Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.075506385Z" level=info msg=serving... address=/run/containerd/containerd.sock Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.085519103Z" level=info msg="Start subscribing containerd event" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.085581785Z" level=info msg="Start recovering state" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.085664660Z" level=info msg="Start event monitor" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.085697850Z" level=info msg="Start snapshots syncer" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.085716444Z" level=info msg="Start cni network conf syncer for default" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.085727341Z" level=info msg="Start streaming server" Dec 13 01:47:48.108204 env[1412]: time="2024-12-13T01:47:48.086080236Z" level=info msg="containerd successfully booted in 0.076388s" Dec 13 01:47:48.108654 extend-filesystems[1390]: Old size kept for /dev/sda9 Dec 13 01:47:48.108654 extend-filesystems[1390]: Found sr0 Dec 13 01:47:48.075632 systemd[1]: Started containerd.service. Dec 13 01:47:48.101984 systemd[1]: extend-filesystems.service: Deactivated successfully. Dec 13 01:47:48.102180 systemd[1]: Finished extend-filesystems.service. Dec 13 01:47:48.230014 tar[1410]: linux-amd64/helm Dec 13 01:47:48.246969 bash[1441]: Updated "/home/core/.ssh/authorized_keys" Dec 13 01:47:48.247162 systemd[1]: Finished update-ssh-keys-after-ignition.service. Dec 13 01:47:48.368353 systemd[1]: nvidia.service: Deactivated successfully. Dec 13 01:47:48.479519 dbus-daemon[1388]: [system] SELinux support is enabled Dec 13 01:47:48.479715 systemd[1]: Started dbus.service. Dec 13 01:47:48.484394 systemd[1]: system-cloudinit@usr-share-oem-cloud\x2dconfig.yml.service was skipped because of an unmet condition check (ConditionFileNotEmpty=/usr/share/oem/cloud-config.yml). Dec 13 01:47:48.484428 systemd[1]: Reached target system-config.target. Dec 13 01:47:48.486736 systemd[1]: user-cloudinit-proc-cmdline.service was skipped because of an unmet condition check (ConditionKernelCommandLine=cloud-config-url). Dec 13 01:47:48.486759 systemd[1]: Reached target user-config.target. Dec 13 01:47:48.489619 systemd[1]: Started systemd-logind.service. Dec 13 01:47:48.490023 dbus-daemon[1388]: [system] Successfully activated service 'org.freedesktop.systemd1' Dec 13 01:47:49.093426 tar[1410]: linux-amd64/LICENSE Dec 13 01:47:49.093588 tar[1410]: linux-amd64/README.md Dec 13 01:47:49.106631 systemd[1]: Finished prepare-helm.service. Dec 13 01:47:49.261411 systemd[1]: Started kubelet.service. Dec 13 01:47:49.587936 update_engine[1404]: I1213 01:47:49.587414 1404 main.cc:92] Flatcar Update Engine starting Dec 13 01:47:49.690596 systemd[1]: Started update-engine.service. Dec 13 01:47:49.691252 update_engine[1404]: I1213 01:47:49.691152 1404 update_check_scheduler.cc:74] Next update check in 9m3s Dec 13 01:47:49.695616 systemd[1]: Started locksmithd.service. Dec 13 01:47:49.929929 kubelet[1493]: E1213 01:47:49.929876 1493 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:47:49.932170 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:47:49.932324 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:47:49.932591 systemd[1]: kubelet.service: Consumed 1.095s CPU time. Dec 13 01:47:50.003342 sshd_keygen[1411]: ssh-keygen: generating new host keys: RSA ECDSA ED25519 Dec 13 01:47:50.023533 systemd[1]: Finished sshd-keygen.service. Dec 13 01:47:50.027905 systemd[1]: Starting issuegen.service... Dec 13 01:47:50.031485 systemd[1]: Started waagent.service. Dec 13 01:47:50.038219 systemd[1]: issuegen.service: Deactivated successfully. Dec 13 01:47:50.038400 systemd[1]: Finished issuegen.service. Dec 13 01:47:50.042772 systemd[1]: Starting systemd-user-sessions.service... Dec 13 01:47:50.049413 systemd[1]: Finished systemd-user-sessions.service. Dec 13 01:47:50.061270 systemd[1]: Started getty@tty1.service. Dec 13 01:47:50.065457 systemd[1]: Started serial-getty@ttyS0.service. Dec 13 01:47:50.071011 systemd[1]: Reached target getty.target. Dec 13 01:47:50.074371 systemd[1]: Reached target multi-user.target. Dec 13 01:47:50.079348 systemd[1]: Starting systemd-update-utmp-runlevel.service... Dec 13 01:47:50.094410 systemd[1]: systemd-update-utmp-runlevel.service: Deactivated successfully. Dec 13 01:47:50.094614 systemd[1]: Finished systemd-update-utmp-runlevel.service. Dec 13 01:47:50.097967 systemd[1]: Startup finished in 553ms (firmware) + 29.524s (loader) + 1.009s (kernel) + 18.510s (initrd) + 40.972s (userspace) = 1min 30.570s. Dec 13 01:47:50.450256 login[1514]: pam_lastlog(login:session): file /var/log/lastlog is locked/write Dec 13 01:47:50.452195 login[1515]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 01:47:50.497063 systemd[1]: Created slice user-500.slice. Dec 13 01:47:50.498555 systemd[1]: Starting user-runtime-dir@500.service... Dec 13 01:47:50.506332 systemd-logind[1399]: New session 2 of user core. Dec 13 01:47:50.511671 systemd[1]: Finished user-runtime-dir@500.service. Dec 13 01:47:50.513401 systemd[1]: Starting user@500.service... Dec 13 01:47:50.547511 (systemd)[1521]: pam_unix(systemd-user:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:47:50.788101 systemd[1521]: Queued start job for default target default.target. Dec 13 01:47:50.788766 systemd[1521]: Reached target paths.target. Dec 13 01:47:50.788802 systemd[1521]: Reached target sockets.target. Dec 13 01:47:50.788825 systemd[1521]: Reached target timers.target. Dec 13 01:47:50.788844 systemd[1521]: Reached target basic.target. Dec 13 01:47:50.788905 systemd[1521]: Reached target default.target. Dec 13 01:47:50.788972 systemd[1521]: Startup finished in 234ms. Dec 13 01:47:50.789006 systemd[1]: Started user@500.service. Dec 13 01:47:50.790124 systemd[1]: Started session-2.scope. Dec 13 01:47:51.450714 login[1514]: pam_unix(login:session): session opened for user core(uid=500) by LOGIN(uid=0) Dec 13 01:47:51.454484 systemd-logind[1399]: New session 1 of user core. Dec 13 01:47:51.455768 systemd[1]: Started session-1.scope. Dec 13 01:47:52.240879 locksmithd[1499]: locksmithd starting currentOperation="UPDATE_STATUS_IDLE" strategy="reboot" Dec 13 01:47:57.711589 waagent[1508]: 2024-12-13T01:47:57.711470Z INFO Daemon Daemon Azure Linux Agent Version:2.6.0.2 Dec 13 01:47:57.725537 waagent[1508]: 2024-12-13T01:47:57.725445Z INFO Daemon Daemon OS: flatcar 3510.3.6 Dec 13 01:47:57.728528 waagent[1508]: 2024-12-13T01:47:57.728462Z INFO Daemon Daemon Python: 3.9.16 Dec 13 01:47:57.733015 waagent[1508]: 2024-12-13T01:47:57.732937Z INFO Daemon Daemon Run daemon Dec 13 01:47:57.735896 waagent[1508]: 2024-12-13T01:47:57.735830Z INFO Daemon Daemon No RDMA handler exists for distro='Flatcar Container Linux by Kinvolk' version='3510.3.6' Dec 13 01:47:57.750214 waagent[1508]: 2024-12-13T01:47:57.750090Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 01:47:57.758893 waagent[1508]: 2024-12-13T01:47:57.758785Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 01:47:57.773303 waagent[1508]: 2024-12-13T01:47:57.759448Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 01:47:57.773303 waagent[1508]: 2024-12-13T01:47:57.763327Z INFO Daemon Daemon Using waagent for provisioning Dec 13 01:47:57.773303 waagent[1508]: 2024-12-13T01:47:57.768028Z INFO Daemon Daemon Activate resource disk Dec 13 01:47:57.773303 waagent[1508]: 2024-12-13T01:47:57.771434Z INFO Daemon Daemon Searching gen1 prefix 00000000-0001 or gen2 f8b3781a-1e82-4818-a1c3-63d806ec15bb Dec 13 01:47:57.784143 waagent[1508]: 2024-12-13T01:47:57.784084Z INFO Daemon Daemon Found device: None Dec 13 01:47:57.786841 waagent[1508]: 2024-12-13T01:47:57.784564Z ERROR Daemon Daemon Failed to mount resource disk [ResourceDiskError] unable to detect disk topology Dec 13 01:47:57.786841 waagent[1508]: 2024-12-13T01:47:57.787646Z ERROR Daemon Daemon Event: name=WALinuxAgent, op=ActivateResourceDisk, message=[ResourceDiskError] unable to detect disk topology, duration=0 Dec 13 01:47:57.786841 waagent[1508]: 2024-12-13T01:47:57.794665Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 01:47:57.786841 waagent[1508]: 2024-12-13T01:47:57.799449Z INFO Daemon Daemon Running default provisioning handler Dec 13 01:47:57.813474 waagent[1508]: 2024-12-13T01:47:57.813344Z INFO Daemon Daemon Unable to get cloud-init enabled status from systemctl: Command '['systemctl', 'is-enabled', 'cloud-init-local.service']' returned non-zero exit status 1. Dec 13 01:47:57.821975 waagent[1508]: 2024-12-13T01:47:57.821854Z INFO Daemon Daemon Unable to get cloud-init enabled status from service: [Errno 2] No such file or directory: 'service' Dec 13 01:47:57.827549 waagent[1508]: 2024-12-13T01:47:57.827481Z INFO Daemon Daemon cloud-init is enabled: False Dec 13 01:47:57.830563 waagent[1508]: 2024-12-13T01:47:57.830495Z INFO Daemon Daemon Copying ovf-env.xml Dec 13 01:47:57.918073 waagent[1508]: 2024-12-13T01:47:57.912681Z INFO Daemon Daemon Successfully mounted dvd Dec 13 01:47:57.966181 systemd[1]: mnt-cdrom-secure.mount: Deactivated successfully. Dec 13 01:47:58.002704 waagent[1508]: 2024-12-13T01:47:58.002542Z INFO Daemon Daemon Detect protocol endpoint Dec 13 01:47:58.006845 waagent[1508]: 2024-12-13T01:47:58.006751Z INFO Daemon Daemon Clean protocol and wireserver endpoint Dec 13 01:47:58.010863 waagent[1508]: 2024-12-13T01:47:58.010794Z INFO Daemon Daemon WireServer endpoint is not found. Rerun dhcp handler Dec 13 01:47:58.015167 waagent[1508]: 2024-12-13T01:47:58.015099Z INFO Daemon Daemon Test for route to 168.63.129.16 Dec 13 01:47:58.018435 waagent[1508]: 2024-12-13T01:47:58.018370Z INFO Daemon Daemon Route to 168.63.129.16 exists Dec 13 01:47:58.021494 waagent[1508]: 2024-12-13T01:47:58.021428Z INFO Daemon Daemon Wire server endpoint:168.63.129.16 Dec 13 01:47:58.185764 waagent[1508]: 2024-12-13T01:47:58.185689Z INFO Daemon Daemon Fabric preferred wire protocol version:2015-04-05 Dec 13 01:47:58.190197 waagent[1508]: 2024-12-13T01:47:58.190149Z INFO Daemon Daemon Wire protocol version:2012-11-30 Dec 13 01:47:58.193331 waagent[1508]: 2024-12-13T01:47:58.193266Z INFO Daemon Daemon Server preferred version:2015-04-05 Dec 13 01:47:58.623280 waagent[1508]: 2024-12-13T01:47:58.623134Z INFO Daemon Daemon Initializing goal state during protocol detection Dec 13 01:47:58.636376 waagent[1508]: 2024-12-13T01:47:58.636289Z INFO Daemon Daemon Forcing an update of the goal state.. Dec 13 01:47:58.639710 waagent[1508]: 2024-12-13T01:47:58.639636Z INFO Daemon Daemon Fetching goal state [incarnation 1] Dec 13 01:47:58.710109 waagent[1508]: 2024-12-13T01:47:58.709984Z INFO Daemon Daemon Found private key matching thumbprint 4C34105A85BA41F2FBC5B589A7F6A15A168AA064 Dec 13 01:47:58.720654 waagent[1508]: 2024-12-13T01:47:58.710432Z INFO Daemon Daemon Certificate with thumbprint 99BC0615B2B0E6E7E40022A7DF828F3459E05AA0 has no matching private key. Dec 13 01:47:58.720654 waagent[1508]: 2024-12-13T01:47:58.711621Z INFO Daemon Daemon Fetch goal state completed Dec 13 01:47:58.760256 waagent[1508]: 2024-12-13T01:47:58.760164Z INFO Daemon Daemon Fetched new vmSettings [correlation ID: 06df3544-ce27-4677-ad45-5f24d25f7fdb New eTag: 2526434247555143473] Dec 13 01:47:58.768100 waagent[1508]: 2024-12-13T01:47:58.761176Z INFO Daemon Daemon Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 01:47:58.776345 waagent[1508]: 2024-12-13T01:47:58.776280Z INFO Daemon Daemon Starting provisioning Dec 13 01:47:58.783851 waagent[1508]: 2024-12-13T01:47:58.778418Z INFO Daemon Daemon Handle ovf-env.xml. Dec 13 01:47:58.783851 waagent[1508]: 2024-12-13T01:47:58.781296Z INFO Daemon Daemon Set hostname [ci-3510.3.6-a-92bad84337] Dec 13 01:47:58.820140 waagent[1508]: 2024-12-13T01:47:58.819993Z INFO Daemon Daemon Publish hostname [ci-3510.3.6-a-92bad84337] Dec 13 01:47:58.830512 waagent[1508]: 2024-12-13T01:47:58.823179Z INFO Daemon Daemon Examine /proc/net/route for primary interface Dec 13 01:47:58.830512 waagent[1508]: 2024-12-13T01:47:58.824672Z INFO Daemon Daemon Primary interface is [eth0] Dec 13 01:47:58.837943 systemd[1]: systemd-networkd-wait-online.service: Deactivated successfully. Dec 13 01:47:58.838196 systemd[1]: Stopped systemd-networkd-wait-online.service. Dec 13 01:47:58.838271 systemd[1]: Stopping systemd-networkd-wait-online.service... Dec 13 01:47:58.838635 systemd[1]: Stopping systemd-networkd.service... Dec 13 01:47:58.842966 systemd-networkd[1173]: eth0: DHCPv6 lease lost Dec 13 01:47:58.844335 systemd[1]: systemd-networkd.service: Deactivated successfully. Dec 13 01:47:58.844546 systemd[1]: Stopped systemd-networkd.service. Dec 13 01:47:58.846982 systemd[1]: Starting systemd-networkd.service... Dec 13 01:47:58.878367 systemd-networkd[1565]: enP41810s1: Link UP Dec 13 01:47:58.878376 systemd-networkd[1565]: enP41810s1: Gained carrier Dec 13 01:47:58.879667 systemd-networkd[1565]: eth0: Link UP Dec 13 01:47:58.879676 systemd-networkd[1565]: eth0: Gained carrier Dec 13 01:47:58.880114 systemd-networkd[1565]: lo: Link UP Dec 13 01:47:58.880123 systemd-networkd[1565]: lo: Gained carrier Dec 13 01:47:58.880434 systemd-networkd[1565]: eth0: Gained IPv6LL Dec 13 01:47:58.881065 systemd-networkd[1565]: Enumeration completed Dec 13 01:47:58.881157 systemd[1]: Started systemd-networkd.service. Dec 13 01:47:58.882905 waagent[1508]: 2024-12-13T01:47:58.882752Z INFO Daemon Daemon Create user account if not exists Dec 13 01:47:58.884212 waagent[1508]: 2024-12-13T01:47:58.884145Z INFO Daemon Daemon User core already exists, skip useradd Dec 13 01:47:58.885129 waagent[1508]: 2024-12-13T01:47:58.885075Z INFO Daemon Daemon Configure sudoer Dec 13 01:47:58.886717 waagent[1508]: 2024-12-13T01:47:58.886661Z INFO Daemon Daemon Configure sshd Dec 13 01:47:58.887793 waagent[1508]: 2024-12-13T01:47:58.887737Z INFO Daemon Daemon Deploy ssh public key. Dec 13 01:47:58.891276 systemd-networkd[1565]: eth0: Configuring with /usr/lib/systemd/network/zz-default.network. Dec 13 01:47:58.894142 systemd[1]: Starting systemd-networkd-wait-online.service... Dec 13 01:47:58.935978 systemd-networkd[1565]: eth0: DHCPv4 address 10.200.8.26/24, gateway 10.200.8.1 acquired from 168.63.129.16 Dec 13 01:47:58.939704 systemd[1]: Finished systemd-networkd-wait-online.service. Dec 13 01:48:00.083134 waagent[1508]: 2024-12-13T01:48:00.083046Z INFO Daemon Daemon Provisioning complete Dec 13 01:48:00.100312 waagent[1508]: 2024-12-13T01:48:00.100209Z INFO Daemon Daemon RDMA capabilities are not enabled, skipping Dec 13 01:48:00.109233 waagent[1508]: 2024-12-13T01:48:00.103734Z INFO Daemon Daemon End of log to /dev/console. The agent will now check for updates and then will process extensions. Dec 13 01:48:00.109233 waagent[1508]: 2024-12-13T01:48:00.106144Z INFO Daemon Daemon Installed Agent WALinuxAgent-2.6.0.2 is the most current agent Dec 13 01:48:00.156420 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 1. Dec 13 01:48:00.156707 systemd[1]: Stopped kubelet.service. Dec 13 01:48:00.156762 systemd[1]: kubelet.service: Consumed 1.095s CPU time. Dec 13 01:48:00.158615 systemd[1]: Starting kubelet.service... Dec 13 01:48:00.277480 systemd[1]: Started kubelet.service. Dec 13 01:48:00.418218 waagent[1574]: 2024-12-13T01:48:00.418119Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 is running as the goal state agent Dec 13 01:48:00.419001 waagent[1574]: 2024-12-13T01:48:00.418925Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:48:00.419163 waagent[1574]: 2024-12-13T01:48:00.419110Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:48:00.430625 waagent[1574]: 2024-12-13T01:48:00.430544Z INFO ExtHandler ExtHandler Forcing an update of the goal state.. Dec 13 01:48:00.430782 waagent[1574]: 2024-12-13T01:48:00.430730Z INFO ExtHandler ExtHandler Fetching goal state [incarnation 1] Dec 13 01:48:00.846962 kubelet[1579]: E1213 01:48:00.846847 1579 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:00.849791 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:00.849976 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:00.906085 waagent[1574]: 2024-12-13T01:48:00.905969Z INFO ExtHandler ExtHandler Found private key matching thumbprint 4C34105A85BA41F2FBC5B589A7F6A15A168AA064 Dec 13 01:48:00.906320 waagent[1574]: 2024-12-13T01:48:00.906262Z INFO ExtHandler ExtHandler Certificate with thumbprint 99BC0615B2B0E6E7E40022A7DF828F3459E05AA0 has no matching private key. Dec 13 01:48:00.906570 waagent[1574]: 2024-12-13T01:48:00.906520Z INFO ExtHandler ExtHandler Fetch goal state completed Dec 13 01:48:00.921823 waagent[1574]: 2024-12-13T01:48:00.921769Z INFO ExtHandler ExtHandler Fetched new vmSettings [correlation ID: cdf1039c-f902-4ccf-b94a-97501cff5e60 New eTag: 2526434247555143473] Dec 13 01:48:00.922393 waagent[1574]: 2024-12-13T01:48:00.922297Z INFO ExtHandler ExtHandler Status Blob type 'None' is not valid, assuming BlockBlob Dec 13 01:48:00.972395 waagent[1574]: 2024-12-13T01:48:00.972267Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 01:48:00.986140 waagent[1574]: 2024-12-13T01:48:00.986040Z INFO ExtHandler ExtHandler WALinuxAgent-2.6.0.2 running as process 1574 Dec 13 01:48:00.989713 waagent[1574]: 2024-12-13T01:48:00.989643Z INFO ExtHandler ExtHandler Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 01:48:00.990932 waagent[1574]: 2024-12-13T01:48:00.990866Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 01:48:01.025046 waagent[1574]: 2024-12-13T01:48:01.024960Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 01:48:01.025496 waagent[1574]: 2024-12-13T01:48:01.025426Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 01:48:01.033897 waagent[1574]: 2024-12-13T01:48:01.033843Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 01:48:01.034372 waagent[1574]: 2024-12-13T01:48:01.034313Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 01:48:01.035422 waagent[1574]: 2024-12-13T01:48:01.035357Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: configuration enabled [False], cgroups enabled [False], python supported: [True] Dec 13 01:48:01.036677 waagent[1574]: 2024-12-13T01:48:01.036617Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 01:48:01.037033 waagent[1574]: 2024-12-13T01:48:01.036977Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:48:01.037396 waagent[1574]: 2024-12-13T01:48:01.037342Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:48:01.037932 waagent[1574]: 2024-12-13T01:48:01.037856Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 01:48:01.038209 waagent[1574]: 2024-12-13T01:48:01.038154Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 01:48:01.038209 waagent[1574]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 01:48:01.038209 waagent[1574]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 01:48:01.038209 waagent[1574]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 01:48:01.038209 waagent[1574]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:48:01.038209 waagent[1574]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:48:01.038209 waagent[1574]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:48:01.040943 waagent[1574]: 2024-12-13T01:48:01.040794Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:48:01.041194 waagent[1574]: 2024-12-13T01:48:01.041129Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 01:48:01.042495 waagent[1574]: 2024-12-13T01:48:01.042436Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 01:48:01.042862 waagent[1574]: 2024-12-13T01:48:01.042813Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:48:01.043090 waagent[1574]: 2024-12-13T01:48:01.043031Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 01:48:01.043833 waagent[1574]: 2024-12-13T01:48:01.043774Z INFO EnvHandler ExtHandler Configure routes Dec 13 01:48:01.044012 waagent[1574]: 2024-12-13T01:48:01.043964Z INFO EnvHandler ExtHandler Gateway:None Dec 13 01:48:01.044226 waagent[1574]: 2024-12-13T01:48:01.044179Z INFO EnvHandler ExtHandler Routes:None Dec 13 01:48:01.045448 waagent[1574]: 2024-12-13T01:48:01.045388Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 01:48:01.045533 waagent[1574]: 2024-12-13T01:48:01.045476Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 01:48:01.045920 waagent[1574]: 2024-12-13T01:48:01.045858Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 01:48:01.059725 waagent[1574]: 2024-12-13T01:48:01.059642Z INFO ExtHandler ExtHandler Checking for agent updates (family: Prod) Dec 13 01:48:01.060678 waagent[1574]: 2024-12-13T01:48:01.060620Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 01:48:01.061949 waagent[1574]: 2024-12-13T01:48:01.061874Z INFO ExtHandler ExtHandler [PERIODIC] Request failed using the direct channel. Error: 'NoneType' object has no attribute 'getheaders' Dec 13 01:48:01.071504 waagent[1574]: 2024-12-13T01:48:01.071447Z ERROR EnvHandler ExtHandler Failed to get the PID of the DHCP client: invalid literal for int() with base 10: 'MainPID=1565' Dec 13 01:48:01.084011 waagent[1574]: 2024-12-13T01:48:01.083888Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 01:48:01.084011 waagent[1574]: Executing ['ip', '-a', '-o', 'link']: Dec 13 01:48:01.084011 waagent[1574]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 01:48:01.084011 waagent[1574]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:87:e3:3c brd ff:ff:ff:ff:ff:ff Dec 13 01:48:01.084011 waagent[1574]: 3: enP41810s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:87:e3:3c brd ff:ff:ff:ff:ff:ff\ altname enP41810p0s2 Dec 13 01:48:01.084011 waagent[1574]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 01:48:01.084011 waagent[1574]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 01:48:01.084011 waagent[1574]: 2: eth0 inet 10.200.8.26/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 01:48:01.084011 waagent[1574]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 01:48:01.084011 waagent[1574]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 01:48:01.084011 waagent[1574]: 2: eth0 inet6 fe80::7e1e:52ff:fe87:e33c/64 scope link \ valid_lft forever preferred_lft forever Dec 13 01:48:01.103466 waagent[1574]: 2024-12-13T01:48:01.103357Z INFO ExtHandler ExtHandler Default channel changed to HostGA channel. Dec 13 01:48:01.213012 waagent[1574]: 2024-12-13T01:48:01.212841Z INFO EnvHandler ExtHandler Successfully added Azure fabric firewall rules Dec 13 01:48:01.215933 waagent[1574]: 2024-12-13T01:48:01.215824Z INFO EnvHandler ExtHandler Firewall rules: Dec 13 01:48:01.215933 waagent[1574]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:48:01.215933 waagent[1574]: pkts bytes target prot opt in out source destination Dec 13 01:48:01.215933 waagent[1574]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:48:01.215933 waagent[1574]: pkts bytes target prot opt in out source destination Dec 13 01:48:01.215933 waagent[1574]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:48:01.215933 waagent[1574]: pkts bytes target prot opt in out source destination Dec 13 01:48:01.215933 waagent[1574]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 01:48:01.215933 waagent[1574]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 01:48:01.217256 waagent[1574]: 2024-12-13T01:48:01.217203Z INFO EnvHandler ExtHandler Set block dev timeout: sda with timeout: 300 Dec 13 01:48:01.392625 waagent[1574]: 2024-12-13T01:48:01.392492Z INFO ExtHandler ExtHandler Agent WALinuxAgent-2.6.0.2 discovered update WALinuxAgent-2.12.0.2 -- exiting Dec 13 01:48:02.113837 waagent[1508]: 2024-12-13T01:48:02.113691Z INFO Daemon Daemon Agent WALinuxAgent-2.6.0.2 launched with command '/usr/share/oem/python/bin/python -u /usr/share/oem/bin/waagent -run-exthandlers' is successfully running Dec 13 01:48:02.119314 waagent[1508]: 2024-12-13T01:48:02.119255Z INFO Daemon Daemon Determined Agent WALinuxAgent-2.12.0.2 to be the latest agent Dec 13 01:48:03.147985 waagent[1623]: 2024-12-13T01:48:03.147868Z INFO ExtHandler ExtHandler Azure Linux Agent (Goal State Agent version 2.12.0.2) Dec 13 01:48:03.148685 waagent[1623]: 2024-12-13T01:48:03.148616Z INFO ExtHandler ExtHandler OS: flatcar 3510.3.6 Dec 13 01:48:03.148835 waagent[1623]: 2024-12-13T01:48:03.148780Z INFO ExtHandler ExtHandler Python: 3.9.16 Dec 13 01:48:03.148997 waagent[1623]: 2024-12-13T01:48:03.148948Z INFO ExtHandler ExtHandler CPU Arch: x86_64 Dec 13 01:48:03.158380 waagent[1623]: 2024-12-13T01:48:03.158286Z INFO ExtHandler ExtHandler Distro: flatcar-3510.3.6; OSUtil: CoreOSUtil; AgentService: waagent; Python: 3.9.16; Arch: x86_64; systemd: True; LISDrivers: Absent; logrotate: logrotate 3.20.1; Dec 13 01:48:03.158762 waagent[1623]: 2024-12-13T01:48:03.158707Z INFO ExtHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:48:03.158942 waagent[1623]: 2024-12-13T01:48:03.158875Z INFO ExtHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:48:03.170568 waagent[1623]: 2024-12-13T01:48:03.170500Z INFO ExtHandler Fetched a new incarnation for the WireServer goal state [incarnation 1] Dec 13 01:48:03.184093 waagent[1623]: 2024-12-13T01:48:03.184036Z INFO ExtHandler ExtHandler HostGAPlugin version: 1.0.8.159 Dec 13 01:48:03.184968 waagent[1623]: 2024-12-13T01:48:03.184894Z INFO ExtHandler Dec 13 01:48:03.185118 waagent[1623]: 2024-12-13T01:48:03.185068Z INFO ExtHandler Fetched new vmSettings [HostGAPlugin correlation ID: d5794eed-5015-4d5a-9222-34a22d023dc8 eTag: 2526434247555143473 source: Fabric] Dec 13 01:48:03.185795 waagent[1623]: 2024-12-13T01:48:03.185738Z INFO ExtHandler The vmSettings originated via Fabric; will ignore them. Dec 13 01:48:03.186867 waagent[1623]: 2024-12-13T01:48:03.186807Z INFO ExtHandler Dec 13 01:48:03.187018 waagent[1623]: 2024-12-13T01:48:03.186967Z INFO ExtHandler Fetching full goal state from the WireServer [incarnation 1] Dec 13 01:48:03.193805 waagent[1623]: 2024-12-13T01:48:03.193753Z INFO ExtHandler ExtHandler Downloading artifacts profile blob Dec 13 01:48:03.194226 waagent[1623]: 2024-12-13T01:48:03.194178Z WARNING ExtHandler ExtHandler Fetch failed: [HttpError] HTTPS is unavailable and required Dec 13 01:48:03.215222 waagent[1623]: 2024-12-13T01:48:03.215146Z INFO ExtHandler ExtHandler Default channel changed to HostGAPlugin channel. Dec 13 01:48:03.281596 waagent[1623]: 2024-12-13T01:48:03.281468Z INFO ExtHandler Downloaded certificate {'thumbprint': '99BC0615B2B0E6E7E40022A7DF828F3459E05AA0', 'hasPrivateKey': False} Dec 13 01:48:03.282581 waagent[1623]: 2024-12-13T01:48:03.282515Z INFO ExtHandler Downloaded certificate {'thumbprint': '4C34105A85BA41F2FBC5B589A7F6A15A168AA064', 'hasPrivateKey': True} Dec 13 01:48:03.283561 waagent[1623]: 2024-12-13T01:48:03.283501Z INFO ExtHandler Fetch goal state completed Dec 13 01:48:03.304657 waagent[1623]: 2024-12-13T01:48:03.304566Z INFO ExtHandler ExtHandler OpenSSL version: OpenSSL 3.0.15 3 Sep 2024 (Library: OpenSSL 3.0.15 3 Sep 2024) Dec 13 01:48:03.315620 waagent[1623]: 2024-12-13T01:48:03.315538Z INFO ExtHandler ExtHandler WALinuxAgent-2.12.0.2 running as process 1623 Dec 13 01:48:03.318627 waagent[1623]: 2024-12-13T01:48:03.318563Z INFO ExtHandler ExtHandler [CGI] Cgroup monitoring is not supported on ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] Dec 13 01:48:03.319583 waagent[1623]: 2024-12-13T01:48:03.319523Z INFO ExtHandler ExtHandler [CGI] Agent will reset the quotas in case distro: ['flatcar', '3510.3.6', '', 'Flatcar Container Linux by Kinvolk'] went from supported to unsupported Dec 13 01:48:03.319859 waagent[1623]: 2024-12-13T01:48:03.319804Z INFO ExtHandler ExtHandler [CGI] Agent cgroups enabled: False Dec 13 01:48:03.321807 waagent[1623]: 2024-12-13T01:48:03.321749Z INFO ExtHandler ExtHandler Starting setup for Persistent firewall rules Dec 13 01:48:03.326413 waagent[1623]: 2024-12-13T01:48:03.326359Z INFO ExtHandler ExtHandler Firewalld service not running/unavailable, trying to set up waagent-network-setup.service Dec 13 01:48:03.326759 waagent[1623]: 2024-12-13T01:48:03.326703Z INFO ExtHandler ExtHandler Successfully updated the Binary file /var/lib/waagent/waagent-network-setup.py for firewall setup Dec 13 01:48:03.334753 waagent[1623]: 2024-12-13T01:48:03.334700Z INFO ExtHandler ExtHandler Service: waagent-network-setup.service not enabled. Adding it now Dec 13 01:48:03.335256 waagent[1623]: 2024-12-13T01:48:03.335198Z ERROR ExtHandler ExtHandler Unable to setup the persistent firewall rules: [Errno 30] Read-only file system: '/lib/systemd/system/waagent-network-setup.service' Dec 13 01:48:03.346946 waagent[1623]: 2024-12-13T01:48:03.346843Z INFO ExtHandler ExtHandler Firewall rule to allow DNS TCP request to wireserver for a non root user unavailable. Setting it now. Dec 13 01:48:03.349607 waagent[1623]: 2024-12-13T01:48:03.349514Z INFO ExtHandler ExtHandler Succesfully added firewall rule to allow non root users to do a DNS TCP request to wireserver Dec 13 01:48:03.350635 waagent[1623]: 2024-12-13T01:48:03.350569Z INFO ExtHandler ExtHandler Checking if log collection is allowed at this time [False]. All three conditions must be met: 1. configuration enabled [True], 2. cgroups v1 enabled [False] OR cgroups v2 is in use and v2 resource limiting configuration enabled [False], 3. python supported: [True] Dec 13 01:48:03.352060 waagent[1623]: 2024-12-13T01:48:03.352000Z INFO ExtHandler ExtHandler Starting env monitor service. Dec 13 01:48:03.352627 waagent[1623]: 2024-12-13T01:48:03.352574Z INFO MonitorHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:48:03.352791 waagent[1623]: 2024-12-13T01:48:03.352743Z INFO MonitorHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:48:03.353375 waagent[1623]: 2024-12-13T01:48:03.353320Z INFO MonitorHandler ExtHandler Monitor.NetworkConfigurationChanges is disabled. Dec 13 01:48:03.353834 waagent[1623]: 2024-12-13T01:48:03.353779Z INFO ExtHandler ExtHandler Start SendTelemetryHandler service. Dec 13 01:48:03.354254 waagent[1623]: 2024-12-13T01:48:03.354200Z INFO MonitorHandler ExtHandler Routing table from /proc/net/route: Dec 13 01:48:03.354254 waagent[1623]: Iface Destination Gateway Flags RefCnt Use Metric Mask MTU Window IRTT Dec 13 01:48:03.354254 waagent[1623]: eth0 00000000 0108C80A 0003 0 0 1024 00000000 0 0 0 Dec 13 01:48:03.354254 waagent[1623]: eth0 0008C80A 00000000 0001 0 0 1024 00FFFFFF 0 0 0 Dec 13 01:48:03.354254 waagent[1623]: eth0 0108C80A 00000000 0005 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:48:03.354254 waagent[1623]: eth0 10813FA8 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:48:03.354254 waagent[1623]: eth0 FEA9FEA9 0108C80A 0007 0 0 1024 FFFFFFFF 0 0 0 Dec 13 01:48:03.356732 waagent[1623]: 2024-12-13T01:48:03.356644Z INFO EnvHandler ExtHandler WireServer endpoint 168.63.129.16 read from file Dec 13 01:48:03.357442 waagent[1623]: 2024-12-13T01:48:03.357383Z INFO EnvHandler ExtHandler Wire server endpoint:168.63.129.16 Dec 13 01:48:03.357904 waagent[1623]: 2024-12-13T01:48:03.357847Z INFO EnvHandler ExtHandler Configure routes Dec 13 01:48:03.358072 waagent[1623]: 2024-12-13T01:48:03.358023Z INFO EnvHandler ExtHandler Gateway:None Dec 13 01:48:03.358203 waagent[1623]: 2024-12-13T01:48:03.358160Z INFO EnvHandler ExtHandler Routes:None Dec 13 01:48:03.361267 waagent[1623]: 2024-12-13T01:48:03.361158Z INFO SendTelemetryHandler ExtHandler Successfully started the SendTelemetryHandler thread Dec 13 01:48:03.361709 waagent[1623]: 2024-12-13T01:48:03.361623Z INFO ExtHandler ExtHandler Start Extension Telemetry service. Dec 13 01:48:03.372377 waagent[1623]: 2024-12-13T01:48:03.372171Z INFO TelemetryEventsCollector ExtHandler Extension Telemetry pipeline enabled: True Dec 13 01:48:03.372803 waagent[1623]: 2024-12-13T01:48:03.372692Z INFO ExtHandler ExtHandler Goal State Period: 6 sec. This indicates how often the agent checks for new goal states and reports status. Dec 13 01:48:03.376930 waagent[1623]: 2024-12-13T01:48:03.376740Z INFO TelemetryEventsCollector ExtHandler Successfully started the TelemetryEventsCollector thread Dec 13 01:48:03.378110 waagent[1623]: 2024-12-13T01:48:03.378037Z INFO MonitorHandler ExtHandler Network interfaces: Dec 13 01:48:03.378110 waagent[1623]: Executing ['ip', '-a', '-o', 'link']: Dec 13 01:48:03.378110 waagent[1623]: 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000\ link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 Dec 13 01:48:03.378110 waagent[1623]: 2: eth0: mtu 1500 qdisc mq state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:87:e3:3c brd ff:ff:ff:ff:ff:ff Dec 13 01:48:03.378110 waagent[1623]: 3: enP41810s1: mtu 1500 qdisc mq master eth0 state UP mode DEFAULT group default qlen 1000\ link/ether 7c:1e:52:87:e3:3c brd ff:ff:ff:ff:ff:ff\ altname enP41810p0s2 Dec 13 01:48:03.378110 waagent[1623]: Executing ['ip', '-4', '-a', '-o', 'address']: Dec 13 01:48:03.378110 waagent[1623]: 1: lo inet 127.0.0.1/8 scope host lo\ valid_lft forever preferred_lft forever Dec 13 01:48:03.378110 waagent[1623]: 2: eth0 inet 10.200.8.26/24 metric 1024 brd 10.200.8.255 scope global eth0\ valid_lft forever preferred_lft forever Dec 13 01:48:03.378110 waagent[1623]: Executing ['ip', '-6', '-a', '-o', 'address']: Dec 13 01:48:03.378110 waagent[1623]: 1: lo inet6 ::1/128 scope host \ valid_lft forever preferred_lft forever Dec 13 01:48:03.378110 waagent[1623]: 2: eth0 inet6 fe80::7e1e:52ff:fe87:e33c/64 scope link \ valid_lft forever preferred_lft forever Dec 13 01:48:03.392421 waagent[1623]: 2024-12-13T01:48:03.392362Z INFO ExtHandler ExtHandler Downloading agent manifest Dec 13 01:48:03.444518 waagent[1623]: 2024-12-13T01:48:03.444452Z INFO EnvHandler ExtHandler Current Firewall rules: Dec 13 01:48:03.444518 waagent[1623]: Chain INPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:48:03.444518 waagent[1623]: pkts bytes target prot opt in out source destination Dec 13 01:48:03.444518 waagent[1623]: Chain FORWARD (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:48:03.444518 waagent[1623]: pkts bytes target prot opt in out source destination Dec 13 01:48:03.444518 waagent[1623]: Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes) Dec 13 01:48:03.444518 waagent[1623]: pkts bytes target prot opt in out source destination Dec 13 01:48:03.444518 waagent[1623]: 0 0 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 tcp dpt:53 Dec 13 01:48:03.444518 waagent[1623]: 149 16349 ACCEPT tcp -- * * 0.0.0.0/0 168.63.129.16 owner UID match 0 Dec 13 01:48:03.444518 waagent[1623]: 0 0 DROP tcp -- * * 0.0.0.0/0 168.63.129.16 ctstate INVALID,NEW Dec 13 01:48:03.445862 waagent[1623]: 2024-12-13T01:48:03.445806Z INFO ExtHandler ExtHandler Dec 13 01:48:03.446134 waagent[1623]: 2024-12-13T01:48:03.446079Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState started [incarnation_1 channel: WireServer source: Fabric activity: f9565d52-3877-43e1-a26f-db93712c3851 correlation 8d47a76e-9e78-45d2-89f0-2c5e5d14f212 created: 2024-12-13T01:46:08.067101Z] Dec 13 01:48:03.447879 waagent[1623]: 2024-12-13T01:48:03.447823Z INFO ExtHandler ExtHandler No extension handlers found, not processing anything. Dec 13 01:48:03.450140 waagent[1623]: 2024-12-13T01:48:03.450084Z INFO ExtHandler ExtHandler ProcessExtensionsGoalState completed [incarnation_1 4 ms] Dec 13 01:48:03.469154 waagent[1623]: 2024-12-13T01:48:03.469096Z INFO ExtHandler ExtHandler Looking for existing remote access users. Dec 13 01:48:03.485183 waagent[1623]: 2024-12-13T01:48:03.485112Z INFO ExtHandler ExtHandler [HEARTBEAT] Agent WALinuxAgent-2.12.0.2 is running as the goal state agent [DEBUG HeartbeatCounter: 0;HeartbeatId: FD9F0F4E-8BA4-4CA4-8D1B-57D8FE66B111;DroppedPackets: 0;UpdateGSErrors: 0;AutoUpdate: 1;UpdateMode: SelfUpdate;] Dec 13 01:48:10.906567 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 2. Dec 13 01:48:10.906897 systemd[1]: Stopped kubelet.service. Dec 13 01:48:10.908904 systemd[1]: Starting kubelet.service... Dec 13 01:48:10.997398 systemd[1]: Started kubelet.service. Dec 13 01:48:11.601431 kubelet[1667]: E1213 01:48:11.601378 1667 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:11.603052 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:11.603211 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:21.656789 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 3. Dec 13 01:48:21.657074 systemd[1]: Stopped kubelet.service. Dec 13 01:48:21.658821 systemd[1]: Starting kubelet.service... Dec 13 01:48:21.745138 systemd[1]: Started kubelet.service. Dec 13 01:48:21.782509 kubelet[1676]: E1213 01:48:21.782463 1676 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:21.784530 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:21.784674 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:22.060167 kernel: hv_balloon: Max. dynamic memory size: 8192 MB Dec 13 01:48:31.906452 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 4. Dec 13 01:48:31.906777 systemd[1]: Stopped kubelet.service. Dec 13 01:48:31.908784 systemd[1]: Starting kubelet.service... Dec 13 01:48:31.997982 systemd[1]: Started kubelet.service. Dec 13 01:48:32.033602 kubelet[1685]: E1213 01:48:32.033556 1685 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:32.035089 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:32.035251 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:34.636138 update_engine[1404]: I1213 01:48:34.636051 1404 update_attempter.cc:509] Updating boot flags... Dec 13 01:48:42.156261 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 5. Dec 13 01:48:42.156517 systemd[1]: Stopped kubelet.service. Dec 13 01:48:42.158225 systemd[1]: Starting kubelet.service... Dec 13 01:48:42.240240 systemd[1]: Started kubelet.service. Dec 13 01:48:42.845139 kubelet[1761]: E1213 01:48:42.845089 1761 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:42.846752 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:42.846925 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:45.171135 systemd[1]: Created slice system-sshd.slice. Dec 13 01:48:45.173133 systemd[1]: Started sshd@0-10.200.8.26:22-10.200.16.10:44022.service. Dec 13 01:48:45.842308 sshd[1767]: Accepted publickey for core from 10.200.16.10 port 44022 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:48:45.844068 sshd[1767]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:45.849163 systemd-logind[1399]: New session 3 of user core. Dec 13 01:48:45.849786 systemd[1]: Started session-3.scope. Dec 13 01:48:46.384603 systemd[1]: Started sshd@1-10.200.8.26:22-10.200.16.10:44026.service. Dec 13 01:48:47.007498 sshd[1772]: Accepted publickey for core from 10.200.16.10 port 44026 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:48:47.008903 sshd[1772]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:47.013827 systemd[1]: Started session-4.scope. Dec 13 01:48:47.014440 systemd-logind[1399]: New session 4 of user core. Dec 13 01:48:47.452061 sshd[1772]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:47.456007 systemd[1]: sshd@1-10.200.8.26:22-10.200.16.10:44026.service: Deactivated successfully. Dec 13 01:48:47.457062 systemd[1]: session-4.scope: Deactivated successfully. Dec 13 01:48:47.457795 systemd-logind[1399]: Session 4 logged out. Waiting for processes to exit. Dec 13 01:48:47.458718 systemd-logind[1399]: Removed session 4. Dec 13 01:48:47.557170 systemd[1]: Started sshd@2-10.200.8.26:22-10.200.16.10:44036.service. Dec 13 01:48:48.181695 sshd[1778]: Accepted publickey for core from 10.200.16.10 port 44036 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:48:48.183360 sshd[1778]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:48.188182 systemd[1]: Started session-5.scope. Dec 13 01:48:48.188631 systemd-logind[1399]: New session 5 of user core. Dec 13 01:48:48.625596 sshd[1778]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:48.628976 systemd[1]: sshd@2-10.200.8.26:22-10.200.16.10:44036.service: Deactivated successfully. Dec 13 01:48:48.630353 systemd-logind[1399]: Session 5 logged out. Waiting for processes to exit. Dec 13 01:48:48.630464 systemd[1]: session-5.scope: Deactivated successfully. Dec 13 01:48:48.631801 systemd-logind[1399]: Removed session 5. Dec 13 01:48:48.732009 systemd[1]: Started sshd@3-10.200.8.26:22-10.200.16.10:43338.service. Dec 13 01:48:49.359375 sshd[1784]: Accepted publickey for core from 10.200.16.10 port 43338 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:48:49.360761 sshd[1784]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:49.365600 systemd[1]: Started session-6.scope. Dec 13 01:48:49.366060 systemd-logind[1399]: New session 6 of user core. Dec 13 01:48:49.811409 sshd[1784]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:49.814950 systemd[1]: sshd@3-10.200.8.26:22-10.200.16.10:43338.service: Deactivated successfully. Dec 13 01:48:49.815779 systemd[1]: session-6.scope: Deactivated successfully. Dec 13 01:48:49.816398 systemd-logind[1399]: Session 6 logged out. Waiting for processes to exit. Dec 13 01:48:49.817190 systemd-logind[1399]: Removed session 6. Dec 13 01:48:49.915542 systemd[1]: Started sshd@4-10.200.8.26:22-10.200.16.10:43350.service. Dec 13 01:48:50.540670 sshd[1790]: Accepted publickey for core from 10.200.16.10 port 43350 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:48:50.542091 sshd[1790]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:50.547347 systemd[1]: Started session-7.scope. Dec 13 01:48:50.548119 systemd-logind[1399]: New session 7 of user core. Dec 13 01:48:50.934194 sudo[1793]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/sbin/setenforce 1 Dec 13 01:48:50.934482 sudo[1793]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:48:50.945116 dbus-daemon[1388]: \xd0\xedC\x99\x94U: received setenforce notice (enforcing=-843583472) Dec 13 01:48:50.947005 sudo[1793]: pam_unix(sudo:session): session closed for user root Dec 13 01:48:51.055336 sshd[1790]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:51.063006 systemd[1]: sshd@4-10.200.8.26:22-10.200.16.10:43350.service: Deactivated successfully. Dec 13 01:48:51.063990 systemd[1]: session-7.scope: Deactivated successfully. Dec 13 01:48:51.064704 systemd-logind[1399]: Session 7 logged out. Waiting for processes to exit. Dec 13 01:48:51.065529 systemd-logind[1399]: Removed session 7. Dec 13 01:48:51.160328 systemd[1]: Started sshd@5-10.200.8.26:22-10.200.16.10:43358.service. Dec 13 01:48:51.785183 sshd[1797]: Accepted publickey for core from 10.200.16.10 port 43358 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:48:51.786890 sshd[1797]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:51.792608 systemd[1]: Started session-8.scope. Dec 13 01:48:51.793360 systemd-logind[1399]: New session 8 of user core. Dec 13 01:48:52.128880 sudo[1801]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/rm -rf /etc/audit/rules.d/80-selinux.rules /etc/audit/rules.d/99-default.rules Dec 13 01:48:52.129272 sudo[1801]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:48:52.132534 sudo[1801]: pam_unix(sudo:session): session closed for user root Dec 13 01:48:52.137129 sudo[1800]: core : PWD=/home/core ; USER=root ; COMMAND=/usr/bin/systemctl restart audit-rules Dec 13 01:48:52.137402 sudo[1800]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:48:52.146168 systemd[1]: Stopping audit-rules.service... Dec 13 01:48:52.146000 audit: CONFIG_CHANGE auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:48:52.147865 auditctl[1804]: No rules Dec 13 01:48:52.150761 kernel: kauditd_printk_skb: 51 callbacks suppressed Dec 13 01:48:52.150822 kernel: audit: type=1305 audit(1734054532.146:224): auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op=remove_rule key=(null) list=5 res=1 Dec 13 01:48:52.148288 systemd[1]: audit-rules.service: Deactivated successfully. Dec 13 01:48:52.148438 systemd[1]: Stopped audit-rules.service. Dec 13 01:48:52.150482 systemd[1]: Starting audit-rules.service... Dec 13 01:48:52.146000 audit[1804]: SYSCALL arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc17d2d70 a2=420 a3=0 items=0 ppid=1 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:52.171833 kernel: audit: type=1300 audit(1734054532.146:224): arch=c000003e syscall=44 success=yes exit=1056 a0=3 a1=7ffdc17d2d70 a2=420 a3=0 items=0 ppid=1 pid=1804 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="auditctl" exe="/usr/sbin/auditctl" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:52.146000 audit: PROCTITLE proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:48:52.147000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.177079 augenrules[1821]: No rules Dec 13 01:48:52.182203 systemd[1]: Finished audit-rules.service. Dec 13 01:48:52.184240 sudo[1800]: pam_unix(sudo:session): session closed for user root Dec 13 01:48:52.187112 kernel: audit: type=1327 audit(1734054532.146:224): proctitle=2F7362696E2F617564697463746C002D44 Dec 13 01:48:52.187172 kernel: audit: type=1131 audit(1734054532.147:225): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.181000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.187923 kernel: audit: type=1130 audit(1734054532.181:226): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=audit-rules comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.181000 audit[1800]: USER_END pid=1800 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.181000 audit[1800]: CRED_DISP pid=1800 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.226455 kernel: audit: type=1106 audit(1734054532.181:227): pid=1800 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.226518 kernel: audit: type=1104 audit(1734054532.181:228): pid=1800 uid=500 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.286305 sshd[1797]: pam_unix(sshd:session): session closed for user core Dec 13 01:48:52.286000 audit[1797]: USER_END pid=1797 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:52.291369 systemd[1]: sshd@5-10.200.8.26:22-10.200.16.10:43358.service: Deactivated successfully. Dec 13 01:48:52.292127 systemd[1]: session-8.scope: Deactivated successfully. Dec 13 01:48:52.293102 systemd-logind[1399]: Session 8 logged out. Waiting for processes to exit. Dec 13 01:48:52.294175 systemd-logind[1399]: Removed session 8. Dec 13 01:48:52.286000 audit[1797]: CRED_DISP pid=1797 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:52.322746 kernel: audit: type=1106 audit(1734054532.286:229): pid=1797 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:52.322806 kernel: audit: type=1104 audit(1734054532.286:230): pid=1797 uid=0 auid=500 ses=8 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:52.322837 kernel: audit: type=1131 audit(1734054532.286:231): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.26:22-10.200.16.10:43358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.286000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@5-10.200.8.26:22-10.200.16.10:43358 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.391117 systemd[1]: Started sshd@6-10.200.8.26:22-10.200.16.10:43370.service. Dec 13 01:48:52.390000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.26:22-10.200.16.10:43370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.906608 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 6. Dec 13 01:48:52.907161 systemd[1]: Stopped kubelet.service. Dec 13 01:48:52.906000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.906000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.909472 systemd[1]: Starting kubelet.service... Dec 13 01:48:52.995000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:52.995504 systemd[1]: Started kubelet.service. Dec 13 01:48:53.015000 audit[1827]: USER_ACCT pid=1827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:53.016000 audit[1827]: CRED_ACQ pid=1827 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:53.018053 sshd[1827]: Accepted publickey for core from 10.200.16.10 port 43370 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:48:53.017000 audit[1827]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffedebf37c0 a2=3 a3=0 items=0 ppid=1 pid=1827 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=9 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.017000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:48:53.018951 sshd[1827]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:48:53.025106 systemd[1]: Started session-9.scope. Dec 13 01:48:53.026025 systemd-logind[1399]: New session 9 of user core. Dec 13 01:48:53.031000 audit[1827]: USER_START pid=1827 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:53.033000 audit[1838]: CRED_ACQ pid=1838 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:48:53.037792 kubelet[1833]: E1213 01:48:53.037762 1833 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:48:53.039086 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:48:53.039230 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:48:53.038000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:48:53.358000 audit[1839]: USER_ACCT pid=1839 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:53.358000 audit[1839]: CRED_REFR pid=1839 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:53.359580 sudo[1839]: core : PWD=/home/core ; USER=root ; COMMAND=/home/core/install.sh Dec 13 01:48:53.359874 sudo[1839]: pam_unix(sudo:session): session opened for user root(uid=0) by (uid=500) Dec 13 01:48:53.360000 audit[1839]: USER_START pid=1839 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:48:53.592073 systemd[1]: Starting docker.service... Dec 13 01:48:53.629506 env[1849]: time="2024-12-13T01:48:53.629150640Z" level=info msg="Starting up" Dec 13 01:48:53.632403 env[1849]: time="2024-12-13T01:48:53.632366671Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:48:53.632403 env[1849]: time="2024-12-13T01:48:53.632396078Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:48:53.632541 env[1849]: time="2024-12-13T01:48:53.632419383Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:48:53.632541 env[1849]: time="2024-12-13T01:48:53.632430886Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:48:53.634363 env[1849]: time="2024-12-13T01:48:53.634337020Z" level=info msg="parsed scheme: \"unix\"" module=grpc Dec 13 01:48:53.634363 env[1849]: time="2024-12-13T01:48:53.634352323Z" level=info msg="scheme \"unix\" not registered, fallback to default scheme" module=grpc Dec 13 01:48:53.634506 env[1849]: time="2024-12-13T01:48:53.634366826Z" level=info msg="ccResolverWrapper: sending update to cc: {[{unix:///var/run/docker/libcontainerd/docker-containerd.sock 0 }] }" module=grpc Dec 13 01:48:53.634506 env[1849]: time="2024-12-13T01:48:53.634376829Z" level=info msg="ClientConn switching balancer to \"pick_first\"" module=grpc Dec 13 01:48:53.642762 systemd[1]: var-lib-docker-check\x2doverlayfs\x2dsupport2703708807-merged.mount: Deactivated successfully. Dec 13 01:48:53.758673 env[1849]: time="2024-12-13T01:48:53.758623283Z" level=info msg="Loading containers: start." Dec 13 01:48:53.790000 audit[1877]: NETFILTER_CFG table=nat:6 family=2 entries=2 op=nft_register_chain pid=1877 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.790000 audit[1877]: SYSCALL arch=c000003e syscall=46 success=yes exit=116 a0=3 a1=7ffe78fd5d20 a2=0 a3=7ffe78fd5d0c items=0 ppid=1849 pid=1877 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.790000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4E00444F434B4552 Dec 13 01:48:53.792000 audit[1879]: NETFILTER_CFG table=filter:7 family=2 entries=2 op=nft_register_chain pid=1879 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.792000 audit[1879]: SYSCALL arch=c000003e syscall=46 success=yes exit=124 a0=3 a1=7ffd96b85230 a2=0 a3=7ffd96b8521c items=0 ppid=1849 pid=1879 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.792000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B4552 Dec 13 01:48:53.794000 audit[1881]: NETFILTER_CFG table=filter:8 family=2 entries=1 op=nft_register_chain pid=1881 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.794000 audit[1881]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7fffa21b36b0 a2=0 a3=7fffa21b369c items=0 ppid=1849 pid=1881 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.794000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:48:53.795000 audit[1883]: NETFILTER_CFG table=filter:9 family=2 entries=1 op=nft_register_chain pid=1883 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.795000 audit[1883]: SYSCALL arch=c000003e syscall=46 success=yes exit=112 a0=3 a1=7ffcd27cb6a0 a2=0 a3=7ffcd27cb68c items=0 ppid=1849 pid=1883 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.795000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:48:53.797000 audit[1885]: NETFILTER_CFG table=filter:10 family=2 entries=1 op=nft_register_rule pid=1885 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.797000 audit[1885]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffcb63bb5f0 a2=0 a3=7ffcb63bb5dc items=0 ppid=1849 pid=1885 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.797000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D31002D6A0052455455524E Dec 13 01:48:53.799000 audit[1887]: NETFILTER_CFG table=filter:11 family=2 entries=1 op=nft_register_rule pid=1887 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.799000 audit[1887]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffe90d64850 a2=0 a3=7ffe90d6483c items=0 ppid=1849 pid=1887 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.799000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D49534F4C4154494F4E2D53544147452D32002D6A0052455455524E Dec 13 01:48:53.817000 audit[1889]: NETFILTER_CFG table=filter:12 family=2 entries=1 op=nft_register_chain pid=1889 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.817000 audit[1889]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fff37273ed0 a2=0 a3=7fff37273ebc items=0 ppid=1849 pid=1889 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.817000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4E00444F434B45522D55534552 Dec 13 01:48:53.819000 audit[1891]: NETFILTER_CFG table=filter:13 family=2 entries=1 op=nft_register_rule pid=1891 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.819000 audit[1891]: SYSCALL arch=c000003e syscall=46 success=yes exit=212 a0=3 a1=7fffb520f120 a2=0 a3=7fffb520f10c items=0 ppid=1849 pid=1891 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.819000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4100444F434B45522D55534552002D6A0052455455524E Dec 13 01:48:53.822000 audit[1893]: NETFILTER_CFG table=filter:14 family=2 entries=2 op=nft_register_chain pid=1893 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.822000 audit[1893]: SYSCALL arch=c000003e syscall=46 success=yes exit=308 a0=3 a1=7ffdfcc01e00 a2=0 a3=7ffdfcc01dec items=0 ppid=1849 pid=1893 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.822000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:53.839000 audit[1897]: NETFILTER_CFG table=filter:15 family=2 entries=1 op=nft_unregister_rule pid=1897 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.839000 audit[1897]: SYSCALL arch=c000003e syscall=46 success=yes exit=216 a0=3 a1=7ffd5025c020 a2=0 a3=7ffd5025c00c items=0 ppid=1849 pid=1897 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.839000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:53.845000 audit[1898]: NETFILTER_CFG table=filter:16 family=2 entries=1 op=nft_register_rule pid=1898 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.845000 audit[1898]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7ffc36b15140 a2=0 a3=7ffc36b1512c items=0 ppid=1849 pid=1898 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.845000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:53.863932 kernel: Initializing XFRM netlink socket Dec 13 01:48:53.876212 env[1849]: time="2024-12-13T01:48:53.876177816Z" level=info msg="Default bridge (docker0) is assigned with an IP address 172.17.0.0/16. Daemon option --bip can be used to set a preferred IP address" Dec 13 01:48:53.909000 audit[1906]: NETFILTER_CFG table=nat:17 family=2 entries=2 op=nft_register_chain pid=1906 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.909000 audit[1906]: SYSCALL arch=c000003e syscall=46 success=yes exit=492 a0=3 a1=7fff64f392f0 a2=0 a3=7fff64f392dc items=0 ppid=1849 pid=1906 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.909000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900504F5354524F5554494E47002D73003137322E31372E302E302F31360000002D6F00646F636B657230002D6A004D415351554552414445 Dec 13 01:48:53.919000 audit[1909]: NETFILTER_CFG table=nat:18 family=2 entries=1 op=nft_register_rule pid=1909 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.919000 audit[1909]: SYSCALL arch=c000003e syscall=46 success=yes exit=288 a0=3 a1=7fff004c53b0 a2=0 a3=7fff004c539c items=0 ppid=1849 pid=1909 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.919000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4900444F434B4552002D6900646F636B657230002D6A0052455455524E Dec 13 01:48:53.922000 audit[1912]: NETFILTER_CFG table=filter:19 family=2 entries=1 op=nft_register_rule pid=1912 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.922000 audit[1912]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffe59fa8930 a2=0 a3=7ffe59fa891c items=0 ppid=1849 pid=1912 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.922000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B657230002D6F00646F636B657230002D6A00414343455054 Dec 13 01:48:53.924000 audit[1914]: NETFILTER_CFG table=filter:20 family=2 entries=1 op=nft_register_rule pid=1914 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.924000 audit[1914]: SYSCALL arch=c000003e syscall=46 success=yes exit=376 a0=3 a1=7ffd0f9a4b40 a2=0 a3=7ffd0f9a4b2c items=0 ppid=1849 pid=1914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.924000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6900646F636B6572300000002D6F00646F636B657230002D6A00414343455054 Dec 13 01:48:53.926000 audit[1916]: NETFILTER_CFG table=nat:21 family=2 entries=2 op=nft_register_chain pid=1916 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.926000 audit[1916]: SYSCALL arch=c000003e syscall=46 success=yes exit=356 a0=3 a1=7ffd8aa535f0 a2=0 a3=7ffd8aa535dc items=0 ppid=1849 pid=1916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.926000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D4100505245524F5554494E47002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B4552 Dec 13 01:48:53.928000 audit[1918]: NETFILTER_CFG table=nat:22 family=2 entries=2 op=nft_register_chain pid=1918 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.928000 audit[1918]: SYSCALL arch=c000003e syscall=46 success=yes exit=444 a0=3 a1=7ffe462431e0 a2=0 a3=7ffe462431cc items=0 ppid=1849 pid=1918 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.928000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D74006E6174002D41004F5554505554002D6D006164647274797065002D2D6473742D74797065004C4F43414C002D6A00444F434B45520000002D2D647374003132372E302E302E302F38 Dec 13 01:48:53.930000 audit[1920]: NETFILTER_CFG table=filter:23 family=2 entries=1 op=nft_register_rule pid=1920 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.930000 audit[1920]: SYSCALL arch=c000003e syscall=46 success=yes exit=304 a0=3 a1=7ffcfa8a3170 a2=0 a3=7ffcfa8a315c items=0 ppid=1849 pid=1920 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.930000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6A00444F434B4552 Dec 13 01:48:53.932000 audit[1922]: NETFILTER_CFG table=filter:24 family=2 entries=1 op=nft_register_rule pid=1922 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.932000 audit[1922]: SYSCALL arch=c000003e syscall=46 success=yes exit=508 a0=3 a1=7ffdff591c60 a2=0 a3=7ffdff591c4c items=0 ppid=1849 pid=1922 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.932000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6F00646F636B657230002D6D00636F6E6E747261636B002D2D637473746174650052454C415445442C45535441424C4953484544002D6A00414343455054 Dec 13 01:48:53.935000 audit[1924]: NETFILTER_CFG table=filter:25 family=2 entries=1 op=nft_register_rule pid=1924 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.935000 audit[1924]: SYSCALL arch=c000003e syscall=46 success=yes exit=240 a0=3 a1=7ffed8a18ff0 a2=0 a3=7ffed8a18fdc items=0 ppid=1849 pid=1924 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.935000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D31 Dec 13 01:48:53.937000 audit[1926]: NETFILTER_CFG table=filter:26 family=2 entries=1 op=nft_register_rule pid=1926 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.937000 audit[1926]: SYSCALL arch=c000003e syscall=46 success=yes exit=428 a0=3 a1=7ffe182eefe0 a2=0 a3=7ffe182eefcc items=0 ppid=1849 pid=1926 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.937000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D31002D6900646F636B6572300000002D6F00646F636B657230002D6A00444F434B45522D49534F4C4154494F4E2D53544147452D32 Dec 13 01:48:53.939000 audit[1928]: NETFILTER_CFG table=filter:27 family=2 entries=1 op=nft_register_rule pid=1928 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.939000 audit[1928]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffdffbaa210 a2=0 a3=7ffdffbaa1fc items=0 ppid=1849 pid=1928 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.939000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D740066696C746572002D4900444F434B45522D49534F4C4154494F4E2D53544147452D32002D6F00646F636B657230002D6A0044524F50 Dec 13 01:48:53.940428 systemd-networkd[1565]: docker0: Link UP Dec 13 01:48:53.957000 audit[1932]: NETFILTER_CFG table=filter:28 family=2 entries=1 op=nft_unregister_rule pid=1932 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.957000 audit[1932]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd193f8460 a2=0 a3=7ffd193f844c items=0 ppid=1849 pid=1932 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.957000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4400464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:53.962000 audit[1933]: NETFILTER_CFG table=filter:29 family=2 entries=1 op=nft_register_rule pid=1933 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:48:53.962000 audit[1933]: SYSCALL arch=c000003e syscall=46 success=yes exit=224 a0=3 a1=7fff4cbefa80 a2=0 a3=7fff4cbefa6c items=0 ppid=1849 pid=1933 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:48:53.962000 audit: PROCTITLE proctitle=2F7573722F7362696E2F69707461626C6573002D2D77616974002D4900464F5257415244002D6A00444F434B45522D55534552 Dec 13 01:48:53.964099 env[1849]: time="2024-12-13T01:48:53.964070204Z" level=info msg="Loading containers: done." Dec 13 01:48:53.974990 systemd[1]: var-lib-docker-overlay2-opaque\x2dbug\x2dcheck231005738-merged.mount: Deactivated successfully. Dec 13 01:48:54.044866 env[1849]: time="2024-12-13T01:48:54.043365922Z" level=warning msg="Not using native diff for overlay2, this may cause degraded performance for building images: kernel has CONFIG_OVERLAY_FS_REDIRECT_DIR enabled" storage-driver=overlay2 Dec 13 01:48:54.045110 env[1849]: time="2024-12-13T01:48:54.045080402Z" level=info msg="Docker daemon" commit=112bdf3343 graphdriver(s)=overlay2 version=20.10.23 Dec 13 01:48:54.045236 env[1849]: time="2024-12-13T01:48:54.045213731Z" level=info msg="Daemon has completed initialization" Dec 13 01:48:54.091537 systemd[1]: Started docker.service. Dec 13 01:48:54.090000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=docker comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:48:54.101481 env[1849]: time="2024-12-13T01:48:54.101428577Z" level=info msg="API listen on /run/docker.sock" Dec 13 01:48:55.732756 env[1412]: time="2024-12-13T01:48:55.732366016Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\"" Dec 13 01:48:56.391057 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3434456975.mount: Deactivated successfully. Dec 13 01:48:57.970393 env[1412]: time="2024-12-13T01:48:57.970336760Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:57.979428 env[1412]: time="2024-12-13T01:48:57.979376209Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:57.983597 env[1412]: time="2024-12-13T01:48:57.983560864Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-apiserver:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:57.986724 env[1412]: time="2024-12-13T01:48:57.986636993Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-apiserver@sha256:ace6a943b058439bd6daeb74f152e7c36e6fc0b5e481cdff9364cd6ca0473e5e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:57.987617 env[1412]: time="2024-12-13T01:48:57.987586388Z" level=info msg="PullImage \"registry.k8s.io/kube-apiserver:v1.31.4\" returns image reference \"sha256:bdc2eadbf366279693097982a31da61cc2f1d90f07ada3f4b3b91251a18f665e\"" Dec 13 01:48:57.989453 env[1412]: time="2024-12-13T01:48:57.989425964Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\"" Dec 13 01:48:59.622944 env[1412]: time="2024-12-13T01:48:59.622827023Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:59.629121 env[1412]: time="2024-12-13T01:48:59.629034428Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:59.633734 env[1412]: time="2024-12-13T01:48:59.633651924Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-controller-manager:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:59.639129 env[1412]: time="2024-12-13T01:48:59.639036569Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-controller-manager@sha256:4bd1d4a449e7a1a4f375bd7c71abf48a95f8949b38f725ded255077329f21f7b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:48:59.640398 env[1412]: time="2024-12-13T01:48:59.640368828Z" level=info msg="PullImage \"registry.k8s.io/kube-controller-manager:v1.31.4\" returns image reference \"sha256:359b9f2307326a4c66172318ca63ee9792c3146ca57d53329239bd123ea70079\"" Dec 13 01:48:59.641027 env[1412]: time="2024-12-13T01:48:59.641001750Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\"" Dec 13 01:49:01.086043 env[1412]: time="2024-12-13T01:49:01.085893089Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.091614 env[1412]: time="2024-12-13T01:49:01.091575636Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.095592 env[1412]: time="2024-12-13T01:49:01.095492658Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-scheduler:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.100678 env[1412]: time="2024-12-13T01:49:01.100589798Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-scheduler@sha256:1a3081cb7d21763d22eb2c0781cc462d89f501ed523ad558dea1226f128fbfdd,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:01.102403 env[1412]: time="2024-12-13T01:49:01.102372326Z" level=info msg="PullImage \"registry.k8s.io/kube-scheduler:v1.31.4\" returns image reference \"sha256:3a66234066fe10fa299c0a52265f90a107450f0372652867118cd9007940d674\"" Dec 13 01:49:01.104648 env[1412]: time="2024-12-13T01:49:01.104615540Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\"" Dec 13 01:49:02.279046 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4064309053.mount: Deactivated successfully. Dec 13 01:49:02.902961 env[1412]: time="2024-12-13T01:49:02.902897158Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:02.908829 env[1412]: time="2024-12-13T01:49:02.908736007Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:02.913555 env[1412]: time="2024-12-13T01:49:02.913508964Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/kube-proxy:v1.31.4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:02.919233 env[1412]: time="2024-12-13T01:49:02.919199486Z" level=info msg="PullImage \"registry.k8s.io/kube-proxy:v1.31.4\" returns image reference \"sha256:ebf80573666f86f115452db568feb34f6f771c3bdc7bfed14b9577f992cfa300\"" Dec 13 01:49:02.919820 env[1412]: time="2024-12-13T01:49:02.919716379Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/kube-proxy@sha256:1739b3febca392035bf6edfe31efdfa55226be7b57389b2001ae357f7dcb99cf,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:02.920107 env[1412]: time="2024-12-13T01:49:02.920081745Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\"" Dec 13 01:49:03.156521 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 7. Dec 13 01:49:03.156805 systemd[1]: Stopped kubelet.service. Dec 13 01:49:03.171671 kernel: kauditd_printk_skb: 88 callbacks suppressed Dec 13 01:49:03.171794 kernel: audit: type=1130 audit(1734054543.155:270): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:03.155000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:03.158819 systemd[1]: Starting kubelet.service... Dec 13 01:49:03.155000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:03.183480 kernel: audit: type=1131 audit(1734054543.155:271): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:03.244000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:03.245346 systemd[1]: Started kubelet.service. Dec 13 01:49:03.258961 kernel: audit: type=1130 audit(1734054543.244:272): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:03.284447 kubelet[1970]: E1213 01:49:03.284402 1970 run.go:72] "command failed" err="failed to load kubelet config file, path: /var/lib/kubelet/config.yaml, error: failed to load Kubelet config file /var/lib/kubelet/config.yaml, error failed to read kubelet config file \"/var/lib/kubelet/config.yaml\", error: open /var/lib/kubelet/config.yaml: no such file or directory" Dec 13 01:49:03.775757 kernel: audit: type=1131 audit(1734054543.285:273): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:49:03.285000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:49:03.285834 systemd[1]: kubelet.service: Main process exited, code=exited, status=1/FAILURE Dec 13 01:49:03.285965 systemd[1]: kubelet.service: Failed with result 'exit-code'. Dec 13 01:49:04.132447 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount582943375.mount: Deactivated successfully. Dec 13 01:49:05.349637 env[1412]: time="2024-12-13T01:49:05.349584120Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:05.356409 env[1412]: time="2024-12-13T01:49:05.356368850Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:05.361222 env[1412]: time="2024-12-13T01:49:05.361191353Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/coredns/coredns:v1.11.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:05.365565 env[1412]: time="2024-12-13T01:49:05.365528275Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/coredns/coredns@sha256:1eeb4c7316bacb1d4c8ead65571cd92dd21e27359f0d4917f1a5822a73b75db1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:05.366195 env[1412]: time="2024-12-13T01:49:05.366165881Z" level=info msg="PullImage \"registry.k8s.io/coredns/coredns:v1.11.1\" returns image reference \"sha256:cbb01a7bd410dc08ba382018ab909a674fb0e48687f0c00797ed5bc34fcc6bb4\"" Dec 13 01:49:05.366933 env[1412]: time="2024-12-13T01:49:05.366894803Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\"" Dec 13 01:49:05.806447 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2134213905.mount: Deactivated successfully. Dec 13 01:49:05.827331 env[1412]: time="2024-12-13T01:49:05.827244058Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:05.835330 env[1412]: time="2024-12-13T01:49:05.835293599Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:05.839860 env[1412]: time="2024-12-13T01:49:05.839832955Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.10,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:05.843409 env[1412]: time="2024-12-13T01:49:05.843380045Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:ee6521f290b2168b6e0935a181d4cff9be1ac3f505666ef0e3c98fae8199917a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:05.843874 env[1412]: time="2024-12-13T01:49:05.843842922Z" level=info msg="PullImage \"registry.k8s.io/pause:3.10\" returns image reference \"sha256:873ed75102791e5b0b8a7fcd41606c92fcec98d56d05ead4ac5131650004c136\"" Dec 13 01:49:05.844535 env[1412]: time="2024-12-13T01:49:05.844509233Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\"" Dec 13 01:49:06.895922 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4105336795.mount: Deactivated successfully. Dec 13 01:49:09.600156 env[1412]: time="2024-12-13T01:49:09.600094084Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:09.605154 env[1412]: time="2024-12-13T01:49:09.605087237Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:09.609437 env[1412]: time="2024-12-13T01:49:09.609398988Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/etcd:3.5.15-0,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:09.614172 env[1412]: time="2024-12-13T01:49:09.614135902Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/etcd@sha256:a6dc63e6e8cfa0307d7851762fa6b629afb18f28d8aa3fab5a6e91b4af60026a,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:09.614928 env[1412]: time="2024-12-13T01:49:09.614881615Z" level=info msg="PullImage \"registry.k8s.io/etcd:3.5.15-0\" returns image reference \"sha256:2e96e5913fc06e3d26915af3d0f2ca5048cc4b6327e661e80da792cbf8d8d9d4\"" Dec 13 01:49:13.406392 systemd[1]: kubelet.service: Scheduled restart job, restart counter is at 8. Dec 13 01:49:13.406724 systemd[1]: Stopped kubelet.service. Dec 13 01:49:13.404000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:13.408438 systemd[1]: Starting kubelet.service... Dec 13 01:49:13.404000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:13.441761 kernel: audit: type=1130 audit(1734054553.404:274): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:13.441853 kernel: audit: type=1131 audit(1734054553.404:275): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:13.839714 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 01:49:13.839841 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 01:49:13.840288 systemd[1]: Stopped kubelet.service. Dec 13 01:49:13.838000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:49:13.848503 systemd[1]: Starting kubelet.service... Dec 13 01:49:13.868127 kernel: audit: type=1130 audit(1734054553.838:276): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:49:13.892025 systemd[1]: Reloading. Dec 13 01:49:13.986274 /usr/lib/systemd/system-generators/torcx-generator[2020]: time="2024-12-13T01:49:13Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:49:13.986311 /usr/lib/systemd/system-generators/torcx-generator[2020]: time="2024-12-13T01:49:13Z" level=info msg="torcx already run" Dec 13 01:49:14.085095 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:49:14.085117 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:49:14.103858 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:49:14.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.197929 kernel: audit: type=1400 audit(1734054554.183:277): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223480 kernel: audit: type=1400 audit(1734054554.183:278): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223571 kernel: audit: type=1400 audit(1734054554.183:279): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250324 kernel: audit: type=1400 audit(1734054554.183:280): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250412 kernel: audit: type=1400 audit(1734054554.183:281): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.183000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.183000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.210000 audit: BPF prog-id=47 op=LOAD Dec 13 01:49:14.210000 audit: BPF prog-id=46 op=UNLOAD Dec 13 01:49:14.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.264921 kernel: audit: type=1400 audit(1734054554.183:282): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.264953 kernel: audit: audit_backlog=65 > audit_backlog_limit=64 Dec 13 01:49:14.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.210000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.210000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit: BPF prog-id=48 op=LOAD Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit: BPF prog-id=49 op=LOAD Dec 13 01:49:14.223000 audit: BPF prog-id=31 op=UNLOAD Dec 13 01:49:14.223000 audit: BPF prog-id=32 op=UNLOAD Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.223000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.237000 audit: BPF prog-id=50 op=LOAD Dec 13 01:49:14.237000 audit: BPF prog-id=33 op=UNLOAD Dec 13 01:49:14.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.237000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.237000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit: BPF prog-id=51 op=LOAD Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit: BPF prog-id=52 op=LOAD Dec 13 01:49:14.250000 audit: BPF prog-id=34 op=UNLOAD Dec 13 01:49:14.250000 audit: BPF prog-id=35 op=UNLOAD Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.250000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.267000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.267000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.267000 audit: BPF prog-id=53 op=LOAD Dec 13 01:49:14.267000 audit: BPF prog-id=40 op=UNLOAD Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit: BPF prog-id=54 op=LOAD Dec 13 01:49:14.269000 audit: BPF prog-id=36 op=UNLOAD Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit: BPF prog-id=55 op=LOAD Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.269000 audit: BPF prog-id=56 op=LOAD Dec 13 01:49:14.270000 audit: BPF prog-id=37 op=UNLOAD Dec 13 01:49:14.270000 audit: BPF prog-id=38 op=UNLOAD Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.271000 audit: BPF prog-id=57 op=LOAD Dec 13 01:49:14.271000 audit: BPF prog-id=39 op=UNLOAD Dec 13 01:49:14.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.272000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.272000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit: BPF prog-id=58 op=LOAD Dec 13 01:49:14.273000 audit: BPF prog-id=41 op=UNLOAD Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit: BPF prog-id=59 op=LOAD Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.273000 audit: BPF prog-id=60 op=LOAD Dec 13 01:49:14.273000 audit: BPF prog-id=42 op=UNLOAD Dec 13 01:49:14.273000 audit: BPF prog-id=43 op=UNLOAD Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:14.275000 audit: BPF prog-id=61 op=LOAD Dec 13 01:49:14.275000 audit: BPF prog-id=44 op=UNLOAD Dec 13 01:49:14.293000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=failed' Dec 13 01:49:14.293657 systemd[1]: kubelet.service: Control process exited, code=killed, status=15/TERM Dec 13 01:49:14.293740 systemd[1]: kubelet.service: Failed with result 'signal'. Dec 13 01:49:14.294122 systemd[1]: Stopped kubelet.service. Dec 13 01:49:14.296348 systemd[1]: Starting kubelet.service... Dec 13 01:49:14.942000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:14.940454 systemd[1]: Started kubelet.service. Dec 13 01:49:14.979945 kubelet[2087]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:49:14.979945 kubelet[2087]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:49:14.979945 kubelet[2087]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:49:15.375057 kubelet[2087]: I1213 01:49:15.374144 2087 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:49:16.072094 kubelet[2087]: I1213 01:49:16.072050 2087 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 01:49:16.072094 kubelet[2087]: I1213 01:49:16.072082 2087 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:49:16.072570 kubelet[2087]: I1213 01:49:16.072415 2087 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 01:49:16.098826 kubelet[2087]: E1213 01:49:16.098788 2087 certificate_manager.go:562] "Unhandled Error" err="kubernetes.io/kube-apiserver-client-kubelet: Failed while requesting a signed certificate from the control plane: cannot create certificate signing request: Post \"https://10.200.8.26:6443/apis/certificates.k8s.io/v1/certificatesigningrequests\": dial tcp 10.200.8.26:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:49:16.100076 kubelet[2087]: I1213 01:49:16.100045 2087 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:49:16.114004 kubelet[2087]: E1213 01:49:16.113960 2087 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 01:49:16.114004 kubelet[2087]: I1213 01:49:16.114002 2087 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 01:49:16.118896 kubelet[2087]: I1213 01:49:16.118860 2087 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:49:16.119650 kubelet[2087]: I1213 01:49:16.119629 2087 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 01:49:16.119835 kubelet[2087]: I1213 01:49:16.119799 2087 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:49:16.120071 kubelet[2087]: I1213 01:49:16.119832 2087 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-92bad84337","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 01:49:16.120228 kubelet[2087]: I1213 01:49:16.120080 2087 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:49:16.120228 kubelet[2087]: I1213 01:49:16.120096 2087 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 01:49:16.120228 kubelet[2087]: I1213 01:49:16.120214 2087 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:49:16.128170 kubelet[2087]: I1213 01:49:16.128149 2087 kubelet.go:408] "Attempting to sync node with API server" Dec 13 01:49:16.128256 kubelet[2087]: I1213 01:49:16.128178 2087 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:49:16.128256 kubelet[2087]: I1213 01:49:16.128217 2087 kubelet.go:314] "Adding apiserver pod source" Dec 13 01:49:16.128256 kubelet[2087]: I1213 01:49:16.128235 2087 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:49:16.149147 kubelet[2087]: W1213 01:49:16.149116 2087 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.8.26:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-92bad84337&limit=500&resourceVersion=0": dial tcp 10.200.8.26:6443: connect: connection refused Dec 13 01:49:16.149319 kubelet[2087]: E1213 01:49:16.149297 2087 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.8.26:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-92bad84337&limit=500&resourceVersion=0\": dial tcp 10.200.8.26:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:49:16.150014 kubelet[2087]: W1213 01:49:16.149968 2087 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.8.26:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.8.26:6443: connect: connection refused Dec 13 01:49:16.150169 kubelet[2087]: E1213 01:49:16.150140 2087 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.8.26:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.8.26:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:49:16.150268 kubelet[2087]: I1213 01:49:16.150250 2087 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:49:16.154994 kubelet[2087]: I1213 01:49:16.154968 2087 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:49:16.161986 kubelet[2087]: W1213 01:49:16.161948 2087 probe.go:272] Flexvolume plugin directory at /opt/libexec/kubernetes/kubelet-plugins/volume/exec/ does not exist. Recreating. Dec 13 01:49:16.162792 kubelet[2087]: I1213 01:49:16.162776 2087 server.go:1269] "Started kubelet" Dec 13 01:49:16.169000 audit[2087]: AVC avc: denied { mac_admin } for pid=2087 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:16.169000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:49:16.169000 audit[2087]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c00083d170 a1=c000846a38 a2=c00083d140 a3=25 items=0 ppid=1 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.169000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:49:16.171254 kubelet[2087]: I1213 01:49:16.171223 2087 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:49:16.170000 audit[2087]: AVC avc: denied { mac_admin } for pid=2087 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:16.170000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:49:16.170000 audit[2087]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000842720 a1=c000846a50 a2=c00083d200 a3=25 items=0 ppid=1 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.170000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:49:16.171640 kubelet[2087]: I1213 01:49:16.171614 2087 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:49:16.171730 kubelet[2087]: I1213 01:49:16.171713 2087 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:49:16.172768 kubelet[2087]: E1213 01:49:16.171497 2087 event.go:368] "Unable to write event (may retry after sleeping)" err="Post \"https://10.200.8.26:6443/api/v1/namespaces/default/events\": dial tcp 10.200.8.26:6443: connect: connection refused" event="&Event{ObjectMeta:{ci-3510.3.6-a-92bad84337.1810996e713a7574 default 0 0001-01-01 00:00:00 +0000 UTC map[] map[] [] [] []},InvolvedObject:ObjectReference{Kind:Node,Namespace:,Name:ci-3510.3.6-a-92bad84337,UID:ci-3510.3.6-a-92bad84337,APIVersion:,ResourceVersion:,FieldPath:,},Reason:Starting,Message:Starting kubelet.,Source:EventSource{Component:kubelet,Host:ci-3510.3.6-a-92bad84337,},FirstTimestamp:2024-12-13 01:49:16.162749812 +0000 UTC m=+1.216974958,LastTimestamp:2024-12-13 01:49:16.162749812 +0000 UTC m=+1.216974958,Count:1,Type:Normal,EventTime:0001-01-01 00:00:00 +0000 UTC,Series:nil,Action:,Related:nil,ReportingController:kubelet,ReportingInstance:ci-3510.3.6-a-92bad84337,}" Dec 13 01:49:16.173654 kubelet[2087]: I1213 01:49:16.173365 2087 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 01:49:16.173654 kubelet[2087]: I1213 01:49:16.173456 2087 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:49:16.174368 kubelet[2087]: I1213 01:49:16.174344 2087 server.go:460] "Adding debug handlers to kubelet server" Dec 13 01:49:16.175109 kubelet[2087]: I1213 01:49:16.175063 2087 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:49:16.175271 kubelet[2087]: I1213 01:49:16.175252 2087 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:49:16.176312 kubelet[2087]: E1213 01:49:16.176293 2087 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:49:16.176624 kubelet[2087]: I1213 01:49:16.176606 2087 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 01:49:16.178447 kubelet[2087]: I1213 01:49:16.178425 2087 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 01:49:16.178526 kubelet[2087]: I1213 01:49:16.178482 2087 reconciler.go:26] "Reconciler: start to sync state" Dec 13 01:49:16.178846 kubelet[2087]: W1213 01:49:16.178797 2087 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.8.26:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.26:6443: connect: connection refused Dec 13 01:49:16.178936 kubelet[2087]: E1213 01:49:16.178858 2087 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.8.26:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.8.26:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:49:16.179443 kubelet[2087]: E1213 01:49:16.179132 2087 kubelet_node_status.go:453] "Error getting the current node from lister" err="node \"ci-3510.3.6-a-92bad84337\" not found" Dec 13 01:49:16.180629 kubelet[2087]: E1213 01:49:16.180594 2087 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.26:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-92bad84337?timeout=10s\": dial tcp 10.200.8.26:6443: connect: connection refused" interval="200ms" Dec 13 01:49:16.180794 kubelet[2087]: I1213 01:49:16.180773 2087 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:49:16.180860 kubelet[2087]: I1213 01:49:16.180849 2087 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:49:16.181000 audit[2097]: NETFILTER_CFG table=mangle:30 family=2 entries=2 op=nft_register_chain pid=2097 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:16.181000 audit[2097]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd00be76c0 a2=0 a3=7ffd00be76ac items=0 ppid=2087 pid=2097 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.181000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:49:16.182469 kubelet[2087]: I1213 01:49:16.182449 2087 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:49:16.182000 audit[2098]: NETFILTER_CFG table=filter:31 family=2 entries=1 op=nft_register_chain pid=2098 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:16.182000 audit[2098]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff6aab2940 a2=0 a3=7fff6aab292c items=0 ppid=2087 pid=2098 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.182000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:49:16.186000 audit[2100]: NETFILTER_CFG table=filter:32 family=2 entries=2 op=nft_register_chain pid=2100 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:16.186000 audit[2100]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7ffe01ff3260 a2=0 a3=7ffe01ff324c items=0 ppid=2087 pid=2100 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.186000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:49:16.191000 audit[2102]: NETFILTER_CFG table=filter:33 family=2 entries=2 op=nft_register_chain pid=2102 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:16.191000 audit[2102]: SYSCALL arch=c000003e syscall=46 success=yes exit=312 a0=3 a1=7fff8d6077b0 a2=0 a3=7fff8d60779c items=0 ppid=2087 pid=2102 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.191000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:49:16.218000 audit[2108]: NETFILTER_CFG table=filter:34 family=2 entries=1 op=nft_register_rule pid=2108 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:16.218000 audit[2108]: SYSCALL arch=c000003e syscall=46 success=yes exit=924 a0=3 a1=7ffcf87fe8d0 a2=0 a3=7ffcf87fe8bc items=0 ppid=2087 pid=2108 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.218000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D41004B5542452D4649524557414C4C002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E7400626C6F636B20696E636F6D696E67206C6F63616C6E657420636F6E6E656374696F6E73002D2D647374003132372E302E302E302F38 Dec 13 01:49:16.218964 kubelet[2087]: I1213 01:49:16.218924 2087 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:49:16.219000 audit[2111]: NETFILTER_CFG table=mangle:35 family=2 entries=1 op=nft_register_chain pid=2111 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:16.219000 audit[2111]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffe06116820 a2=0 a3=7ffe0611680c items=0 ppid=2087 pid=2111 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.219000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:49:16.220000 audit[2110]: NETFILTER_CFG table=mangle:36 family=10 entries=2 op=nft_register_chain pid=2110 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:16.220000 audit[2110]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffe03944b20 a2=0 a3=7ffe03944b0c items=0 ppid=2087 pid=2110 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.220000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D49505441424C45532D48494E54002D74006D616E676C65 Dec 13 01:49:16.221777 kubelet[2087]: I1213 01:49:16.221582 2087 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:49:16.221878 kubelet[2087]: I1213 01:49:16.221795 2087 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:49:16.221878 kubelet[2087]: I1213 01:49:16.221830 2087 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 01:49:16.222016 kubelet[2087]: E1213 01:49:16.221883 2087 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:49:16.223127 kubelet[2087]: W1213 01:49:16.223063 2087 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.8.26:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.26:6443: connect: connection refused Dec 13 01:49:16.223295 kubelet[2087]: E1213 01:49:16.223269 2087 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.8.26:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.8.26:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:49:16.222000 audit[2114]: NETFILTER_CFG table=nat:37 family=2 entries=1 op=nft_register_chain pid=2114 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:16.222000 audit[2114]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff49a5c800 a2=0 a3=7fff49a5c7ec items=0 ppid=2087 pid=2114 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.222000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:49:16.223000 audit[2115]: NETFILTER_CFG table=mangle:38 family=10 entries=1 op=nft_register_chain pid=2115 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:16.223000 audit[2115]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdcffbcbb0 a2=0 a3=7ffdcffbcb9c items=0 ppid=2087 pid=2115 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.223000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006D616E676C65 Dec 13 01:49:16.225000 audit[2116]: NETFILTER_CFG table=filter:39 family=2 entries=1 op=nft_register_chain pid=2116 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:16.225000 audit[2116]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffc60631950 a2=0 a3=7ffc6063193c items=0 ppid=2087 pid=2116 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.225000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:49:16.226000 audit[2117]: NETFILTER_CFG table=nat:40 family=10 entries=2 op=nft_register_chain pid=2117 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:16.226000 audit[2117]: SYSCALL arch=c000003e syscall=46 success=yes exit=128 a0=3 a1=7ffdc2835930 a2=0 a3=7ffdc283591c items=0 ppid=2087 pid=2117 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.226000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D74006E6174 Dec 13 01:49:16.227000 audit[2118]: NETFILTER_CFG table=filter:41 family=10 entries=2 op=nft_register_chain pid=2118 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:16.227000 audit[2118]: SYSCALL arch=c000003e syscall=46 success=yes exit=136 a0=3 a1=7ffd18eb5a90 a2=0 a3=7ffd18eb5a7c items=0 ppid=2087 pid=2118 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.227000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4B5542454C45542D43414E415259002D740066696C746572 Dec 13 01:49:16.244159 kubelet[2087]: I1213 01:49:16.244098 2087 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:49:16.244159 kubelet[2087]: I1213 01:49:16.244117 2087 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:49:16.244159 kubelet[2087]: I1213 01:49:16.244153 2087 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:49:16.248189 kubelet[2087]: I1213 01:49:16.248150 2087 policy_none.go:49] "None policy: Start" Dec 13 01:49:16.248833 kubelet[2087]: I1213 01:49:16.248822 2087 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:49:16.248946 kubelet[2087]: I1213 01:49:16.248937 2087 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:49:16.257248 systemd[1]: Created slice kubepods.slice. Dec 13 01:49:16.261592 systemd[1]: Created slice kubepods-burstable.slice. Dec 13 01:49:16.264413 systemd[1]: Created slice kubepods-besteffort.slice. Dec 13 01:49:16.270533 kubelet[2087]: I1213 01:49:16.270512 2087 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:49:16.269000 audit[2087]: AVC avc: denied { mac_admin } for pid=2087 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:16.269000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:49:16.269000 audit[2087]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000d1f170 a1=c000543e78 a2=c000d1f140 a3=25 items=0 ppid=1 pid=2087 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:16.269000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:49:16.271067 kubelet[2087]: I1213 01:49:16.271046 2087 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:49:16.271258 kubelet[2087]: I1213 01:49:16.271247 2087 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 01:49:16.271355 kubelet[2087]: I1213 01:49:16.271323 2087 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 01:49:16.271711 kubelet[2087]: I1213 01:49:16.271698 2087 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:49:16.274844 kubelet[2087]: E1213 01:49:16.274825 2087 eviction_manager.go:285] "Eviction manager: failed to get summary stats" err="failed to get node info: node \"ci-3510.3.6-a-92bad84337\" not found" Dec 13 01:49:16.331713 systemd[1]: Created slice kubepods-burstable-pod0494eb62d61ba9d99e4be7e326ccc2cd.slice. Dec 13 01:49:16.342177 systemd[1]: Created slice kubepods-burstable-pod4674c483657777985348835a7f385890.slice. Dec 13 01:49:16.351143 systemd[1]: Created slice kubepods-burstable-pode91a6bcf3b498faffe654d59be3a939c.slice. Dec 13 01:49:16.373256 kubelet[2087]: I1213 01:49:16.373223 2087 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.373580 kubelet[2087]: E1213 01:49:16.373552 2087 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.8.26:6443/api/v1/nodes\": dial tcp 10.200.8.26:6443: connect: connection refused" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.380060 kubelet[2087]: I1213 01:49:16.380033 2087 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4674c483657777985348835a7f385890-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-92bad84337\" (UID: \"4674c483657777985348835a7f385890\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.380159 kubelet[2087]: I1213 01:49:16.380066 2087 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.380159 kubelet[2087]: I1213 01:49:16.380097 2087 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.380159 kubelet[2087]: I1213 01:49:16.380140 2087 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.380338 kubelet[2087]: I1213 01:49:16.380160 2087 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e91a6bcf3b498faffe654d59be3a939c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-92bad84337\" (UID: \"e91a6bcf3b498faffe654d59be3a939c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.380338 kubelet[2087]: I1213 01:49:16.380182 2087 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e91a6bcf3b498faffe654d59be3a939c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-92bad84337\" (UID: \"e91a6bcf3b498faffe654d59be3a939c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.380338 kubelet[2087]: I1213 01:49:16.380206 2087 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.380338 kubelet[2087]: I1213 01:49:16.380228 2087 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.380338 kubelet[2087]: I1213 01:49:16.380252 2087 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e91a6bcf3b498faffe654d59be3a939c-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-92bad84337\" (UID: \"e91a6bcf3b498faffe654d59be3a939c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.381585 kubelet[2087]: E1213 01:49:16.381478 2087 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.26:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-92bad84337?timeout=10s\": dial tcp 10.200.8.26:6443: connect: connection refused" interval="400ms" Dec 13 01:49:16.576100 kubelet[2087]: I1213 01:49:16.576058 2087 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.576478 kubelet[2087]: E1213 01:49:16.576439 2087 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.8.26:6443/api/v1/nodes\": dial tcp 10.200.8.26:6443: connect: connection refused" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.641757 env[1412]: time="2024-12-13T01:49:16.641619015Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-92bad84337,Uid:0494eb62d61ba9d99e4be7e326ccc2cd,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:16.650138 env[1412]: time="2024-12-13T01:49:16.650094398Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-92bad84337,Uid:4674c483657777985348835a7f385890,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:16.654158 env[1412]: time="2024-12-13T01:49:16.653903885Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-92bad84337,Uid:e91a6bcf3b498faffe654d59be3a939c,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:16.782766 kubelet[2087]: E1213 01:49:16.782708 2087 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.26:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-92bad84337?timeout=10s\": dial tcp 10.200.8.26:6443: connect: connection refused" interval="800ms" Dec 13 01:49:16.979313 kubelet[2087]: I1213 01:49:16.979282 2087 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.979613 kubelet[2087]: E1213 01:49:16.979581 2087 kubelet_node_status.go:95] "Unable to register node with API server" err="Post \"https://10.200.8.26:6443/api/v1/nodes\": dial tcp 10.200.8.26:6443: connect: connection refused" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:16.999366 kubelet[2087]: W1213 01:49:16.999310 2087 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.CSIDriver: Get "https://10.200.8.26:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0": dial tcp 10.200.8.26:6443: connect: connection refused Dec 13 01:49:16.999471 kubelet[2087]: E1213 01:49:16.999381 2087 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.CSIDriver: failed to list *v1.CSIDriver: Get \"https://10.200.8.26:6443/apis/storage.k8s.io/v1/csidrivers?limit=500&resourceVersion=0\": dial tcp 10.200.8.26:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:49:17.089100 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4176658943.mount: Deactivated successfully. Dec 13 01:49:17.090433 kubelet[2087]: W1213 01:49:17.090394 2087 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.RuntimeClass: Get "https://10.200.8.26:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0": dial tcp 10.200.8.26:6443: connect: connection refused Dec 13 01:49:17.090692 kubelet[2087]: E1213 01:49:17.090454 2087 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.RuntimeClass: failed to list *v1.RuntimeClass: Get \"https://10.200.8.26:6443/apis/node.k8s.io/v1/runtimeclasses?limit=500&resourceVersion=0\": dial tcp 10.200.8.26:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:49:17.100533 kubelet[2087]: W1213 01:49:17.100480 2087 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Service: Get "https://10.200.8.26:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0": dial tcp 10.200.8.26:6443: connect: connection refused Dec 13 01:49:17.100615 kubelet[2087]: E1213 01:49:17.100547 2087 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Service: failed to list *v1.Service: Get \"https://10.200.8.26:6443/api/v1/services?fieldSelector=spec.clusterIP%21%3DNone&limit=500&resourceVersion=0\": dial tcp 10.200.8.26:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:49:17.117507 env[1412]: time="2024-12-13T01:49:17.117464293Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.120464 env[1412]: time="2024-12-13T01:49:17.120379057Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.129703 env[1412]: time="2024-12-13T01:49:17.129668317Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.133636 env[1412]: time="2024-12-13T01:49:17.133602809Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.136876 env[1412]: time="2024-12-13T01:49:17.136843214Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.139782 env[1412]: time="2024-12-13T01:49:17.139749777Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.144989 env[1412]: time="2024-12-13T01:49:17.144960628Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.147607 env[1412]: time="2024-12-13T01:49:17.147575654Z" level=info msg="ImageCreate event &ImageCreate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.155942 env[1412]: time="2024-12-13T01:49:17.155896894Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.161849 env[1412]: time="2024-12-13T01:49:17.161814533Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:6270bb605e12e581514ada5fd5b3216f727db55dc87d5889c790e4c760683fee,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.179834 env[1412]: time="2024-12-13T01:49:17.179795379Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause:3.6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.180633 kubelet[2087]: W1213 01:49:17.180506 2087 reflector.go:561] k8s.io/client-go/informers/factory.go:160: failed to list *v1.Node: Get "https://10.200.8.26:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-92bad84337&limit=500&resourceVersion=0": dial tcp 10.200.8.26:6443: connect: connection refused Dec 13 01:49:17.180633 kubelet[2087]: E1213 01:49:17.180594 2087 reflector.go:158] "Unhandled Error" err="k8s.io/client-go/informers/factory.go:160: Failed to watch *v1.Node: failed to list *v1.Node: Get \"https://10.200.8.26:6443/api/v1/nodes?fieldSelector=metadata.name%3Dci-3510.3.6-a-92bad84337&limit=500&resourceVersion=0\": dial tcp 10.200.8.26:6443: connect: connection refused" logger="UnhandledError" Dec 13 01:49:17.207889 env[1412]: time="2024-12-13T01:49:17.207855184Z" level=info msg="ImageUpdate event &ImageUpdate{Name:registry.k8s.io/pause@sha256:3d380ca8864549e74af4b29c10f9cb0956236dfb01c40ca076fb6c37253234db,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:17.264884 env[1412]: time="2024-12-13T01:49:17.263693959Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:17.265622 env[1412]: time="2024-12-13T01:49:17.263737064Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:17.265622 env[1412]: time="2024-12-13T01:49:17.263752966Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:17.265622 env[1412]: time="2024-12-13T01:49:17.265142340Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ca282ccac6233072c44e41285125a1f9df144ff924710ffbcd33cba163832b7 pid=2127 runtime=io.containerd.runc.v2 Dec 13 01:49:17.275682 env[1412]: time="2024-12-13T01:49:17.275622449Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:17.275806 env[1412]: time="2024-12-13T01:49:17.275690857Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:17.275806 env[1412]: time="2024-12-13T01:49:17.275717961Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:17.275907 env[1412]: time="2024-12-13T01:49:17.275851777Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/e289548d34cd0fdeaf9d7c6acc7bfbf1af1b6a71ad262b44be9027e2635b662e pid=2144 runtime=io.containerd.runc.v2 Dec 13 01:49:17.297786 env[1412]: time="2024-12-13T01:49:17.297705107Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:17.298027 env[1412]: time="2024-12-13T01:49:17.297995643Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:17.298278 env[1412]: time="2024-12-13T01:49:17.298240074Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:17.298772 env[1412]: time="2024-12-13T01:49:17.298721134Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0f1f1490b4e6172778f0767c119c35f428b4949af206e1df97dd502229624437 pid=2166 runtime=io.containerd.runc.v2 Dec 13 01:49:17.299126 systemd[1]: Started cri-containerd-e289548d34cd0fdeaf9d7c6acc7bfbf1af1b6a71ad262b44be9027e2635b662e.scope. Dec 13 01:49:17.311758 systemd[1]: Started cri-containerd-2ca282ccac6233072c44e41285125a1f9df144ff924710ffbcd33cba163832b7.scope. Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.326000 audit: BPF prog-id=62 op=LOAD Dec 13 01:49:17.327000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.327000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2144 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.327000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383935343864333463643066646561663964376336616363376266 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2144 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383935343864333463643066646561663964376336616363376266 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit: BPF prog-id=63 op=LOAD Dec 13 01:49:17.328000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c00040a190 items=0 ppid=2144 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383935343864333463643066646561663964376336616363376266 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit: BPF prog-id=64 op=LOAD Dec 13 01:49:17.328000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c00040a1d8 items=0 ppid=2144 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383935343864333463643066646561663964376336616363376266 Dec 13 01:49:17.328000 audit: BPF prog-id=64 op=UNLOAD Dec 13 01:49:17.328000 audit: BPF prog-id=63 op=UNLOAD Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { perfmon } for pid=2152 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit[2152]: AVC avc: denied { bpf } for pid=2152 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.328000 audit: BPF prog-id=65 op=LOAD Dec 13 01:49:17.328000 audit[2152]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c00040a5e8 items=0 ppid=2144 pid=2152 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.328000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6532383935343864333463643066646561663964376336616363376266 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit: BPF prog-id=66 op=LOAD Dec 13 01:49:17.338000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[2141]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2127 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613238326363616336323333303732633434653431323835313235 Dec 13 01:49:17.338000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.338000 audit[2141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2127 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.338000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613238326363616336323333303732633434653431323835313235 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit: BPF prog-id=67 op=LOAD Dec 13 01:49:17.339000 audit[2141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003d4130 items=0 ppid=2127 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613238326363616336323333303732633434653431323835313235 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit: BPF prog-id=68 op=LOAD Dec 13 01:49:17.339000 audit[2141]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003d4178 items=0 ppid=2127 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613238326363616336323333303732633434653431323835313235 Dec 13 01:49:17.339000 audit: BPF prog-id=68 op=UNLOAD Dec 13 01:49:17.339000 audit: BPF prog-id=67 op=UNLOAD Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { perfmon } for pid=2141 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit[2141]: AVC avc: denied { bpf } for pid=2141 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.339000 audit: BPF prog-id=69 op=LOAD Dec 13 01:49:17.339000 audit[2141]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003d4588 items=0 ppid=2127 pid=2141 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.339000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3263613238326363616336323333303732633434653431323835313235 Dec 13 01:49:17.347323 systemd[1]: Started cri-containerd-0f1f1490b4e6172778f0767c119c35f428b4949af206e1df97dd502229624437.scope. Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.363000 audit: BPF prog-id=70 op=LOAD Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2166 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316631343930623465363137323737386630373637633131396333 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=2166 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316631343930623465363137323737386630373637633131396333 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit: BPF prog-id=71 op=LOAD Dec 13 01:49:17.364000 audit[2196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0002cdeb0 items=0 ppid=2166 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316631343930623465363137323737386630373637633131396333 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.364000 audit: BPF prog-id=72 op=LOAD Dec 13 01:49:17.364000 audit[2196]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0002cdef8 items=0 ppid=2166 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.364000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316631343930623465363137323737386630373637633131396333 Dec 13 01:49:17.365000 audit: BPF prog-id=72 op=UNLOAD Dec 13 01:49:17.365000 audit: BPF prog-id=71 op=UNLOAD Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { perfmon } for pid=2196 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit[2196]: AVC avc: denied { bpf } for pid=2196 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.365000 audit: BPF prog-id=73 op=LOAD Dec 13 01:49:17.365000 audit[2196]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0003c0308 items=0 ppid=2166 pid=2196 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.365000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3066316631343930623465363137323737386630373637633131396333 Dec 13 01:49:17.406480 env[1412]: time="2024-12-13T01:49:17.406437589Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-apiserver-ci-3510.3.6-a-92bad84337,Uid:e91a6bcf3b498faffe654d59be3a939c,Namespace:kube-system,Attempt:0,} returns sandbox id \"0f1f1490b4e6172778f0767c119c35f428b4949af206e1df97dd502229624437\"" Dec 13 01:49:17.409967 env[1412]: time="2024-12-13T01:49:17.409930325Z" level=info msg="CreateContainer within sandbox \"0f1f1490b4e6172778f0767c119c35f428b4949af206e1df97dd502229624437\" for container &ContainerMetadata{Name:kube-apiserver,Attempt:0,}" Dec 13 01:49:17.423319 env[1412]: time="2024-12-13T01:49:17.423266891Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-controller-manager-ci-3510.3.6-a-92bad84337,Uid:0494eb62d61ba9d99e4be7e326ccc2cd,Namespace:kube-system,Attempt:0,} returns sandbox id \"2ca282ccac6233072c44e41285125a1f9df144ff924710ffbcd33cba163832b7\"" Dec 13 01:49:17.426710 env[1412]: time="2024-12-13T01:49:17.426678217Z" level=info msg="CreateContainer within sandbox \"2ca282ccac6233072c44e41285125a1f9df144ff924710ffbcd33cba163832b7\" for container &ContainerMetadata{Name:kube-controller-manager,Attempt:0,}" Dec 13 01:49:17.428042 env[1412]: time="2024-12-13T01:49:17.428011084Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-scheduler-ci-3510.3.6-a-92bad84337,Uid:4674c483657777985348835a7f385890,Namespace:kube-system,Attempt:0,} returns sandbox id \"e289548d34cd0fdeaf9d7c6acc7bfbf1af1b6a71ad262b44be9027e2635b662e\"" Dec 13 01:49:17.431230 env[1412]: time="2024-12-13T01:49:17.431198582Z" level=info msg="CreateContainer within sandbox \"e289548d34cd0fdeaf9d7c6acc7bfbf1af1b6a71ad262b44be9027e2635b662e\" for container &ContainerMetadata{Name:kube-scheduler,Attempt:0,}" Dec 13 01:49:17.464149 env[1412]: time="2024-12-13T01:49:17.464094891Z" level=info msg="CreateContainer within sandbox \"0f1f1490b4e6172778f0767c119c35f428b4949af206e1df97dd502229624437\" for &ContainerMetadata{Name:kube-apiserver,Attempt:0,} returns container id \"7df8cb8a0e3e488bac029b1a05d28d36d1a1f1f204c5f6d285801d788fc57699\"" Dec 13 01:49:17.464829 env[1412]: time="2024-12-13T01:49:17.464797179Z" level=info msg="StartContainer for \"7df8cb8a0e3e488bac029b1a05d28d36d1a1f1f204c5f6d285801d788fc57699\"" Dec 13 01:49:17.483183 systemd[1]: Started cri-containerd-7df8cb8a0e3e488bac029b1a05d28d36d1a1f1f204c5f6d285801d788fc57699.scope. Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.498000 audit: BPF prog-id=74 op=LOAD Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2166 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663863623861306533653438386261633032396231613035643238 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2166 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663863623861306533653438386261633032396231613035643238 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit: BPF prog-id=75 op=LOAD Dec 13 01:49:17.499000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000335d40 items=0 ppid=2166 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663863623861306533653438386261633032396231613035643238 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit: BPF prog-id=76 op=LOAD Dec 13 01:49:17.499000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000335d88 items=0 ppid=2166 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663863623861306533653438386261633032396231613035643238 Dec 13 01:49:17.499000 audit: BPF prog-id=76 op=UNLOAD Dec 13 01:49:17.499000 audit: BPF prog-id=75 op=UNLOAD Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { perfmon } for pid=2256 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit[2256]: AVC avc: denied { bpf } for pid=2256 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.499000 audit: BPF prog-id=77 op=LOAD Dec 13 01:49:17.499000 audit[2256]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003ae198 items=0 ppid=2166 pid=2256 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.499000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3764663863623861306533653438386261633032396231613035643238 Dec 13 01:49:17.516033 env[1412]: time="2024-12-13T01:49:17.511865658Z" level=info msg="CreateContainer within sandbox \"e289548d34cd0fdeaf9d7c6acc7bfbf1af1b6a71ad262b44be9027e2635b662e\" for &ContainerMetadata{Name:kube-scheduler,Attempt:0,} returns container id \"de836282b3df1ab53d581ee8599e2a71bbaf58ce794da9d1c6bfff6e85446c00\"" Dec 13 01:49:17.516033 env[1412]: time="2024-12-13T01:49:17.512407126Z" level=info msg="StartContainer for \"de836282b3df1ab53d581ee8599e2a71bbaf58ce794da9d1c6bfff6e85446c00\"" Dec 13 01:49:17.520982 env[1412]: time="2024-12-13T01:49:17.520941092Z" level=info msg="CreateContainer within sandbox \"2ca282ccac6233072c44e41285125a1f9df144ff924710ffbcd33cba163832b7\" for &ContainerMetadata{Name:kube-controller-manager,Attempt:0,} returns container id \"a842a1d0356183e27d00db8a9a49173f6622560626edc8c95ef2dff4a4c94b98\"" Dec 13 01:49:17.524336 env[1412]: time="2024-12-13T01:49:17.524305312Z" level=info msg="StartContainer for \"a842a1d0356183e27d00db8a9a49173f6622560626edc8c95ef2dff4a4c94b98\"" Dec 13 01:49:17.550518 systemd[1]: Started cri-containerd-de836282b3df1ab53d581ee8599e2a71bbaf58ce794da9d1c6bfff6e85446c00.scope. Dec 13 01:49:17.562199 env[1412]: time="2024-12-13T01:49:17.562149839Z" level=info msg="StartContainer for \"7df8cb8a0e3e488bac029b1a05d28d36d1a1f1f204c5f6d285801d788fc57699\" returns successfully" Dec 13 01:49:17.569225 systemd[1]: Started cri-containerd-a842a1d0356183e27d00db8a9a49173f6622560626edc8c95ef2dff4a4c94b98.scope. Dec 13 01:49:17.583947 kubelet[2087]: E1213 01:49:17.583872 2087 controller.go:145] "Failed to ensure lease exists, will retry" err="Get \"https://10.200.8.26:6443/apis/coordination.k8s.io/v1/namespaces/kube-node-lease/leases/ci-3510.3.6-a-92bad84337?timeout=10s\": dial tcp 10.200.8.26:6443: connect: connection refused" interval="1.6s" Dec 13 01:49:17.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.596000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.596000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit: BPF prog-id=78 op=LOAD Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343261316430333536313833653237643030646238613961343931 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343261316430333536313833653237643030646238613961343931 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.597000 audit: BPF prog-id=79 op=LOAD Dec 13 01:49:17.597000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0001ddd80 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.597000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343261316430333536313833653237643030646238613961343931 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit: BPF prog-id=80 op=LOAD Dec 13 01:49:17.598000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0001dddc8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343261316430333536313833653237643030646238613961343931 Dec 13 01:49:17.598000 audit: BPF prog-id=80 op=UNLOAD Dec 13 01:49:17.598000 audit: BPF prog-id=79 op=UNLOAD Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { perfmon } for pid=2295 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit[2295]: AVC avc: denied { bpf } for pid=2295 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.598000 audit: BPF prog-id=81 op=LOAD Dec 13 01:49:17.598000 audit[2295]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003a81d8 items=0 ppid=2127 pid=2295 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.598000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6138343261316430333536313833653237643030646238613961343931 Dec 13 01:49:17.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.604000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.604000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit: BPF prog-id=82 op=LOAD Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2144 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383336323832623364663161623533643538316565383539396532 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=8 items=0 ppid=2144 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383336323832623364663161623533643538316565383539396532 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit: BPF prog-id=83 op=LOAD Dec 13 01:49:17.605000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c00020e500 items=0 ppid=2144 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383336323832623364663161623533643538316565383539396532 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit: BPF prog-id=84 op=LOAD Dec 13 01:49:17.605000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c00020e548 items=0 ppid=2144 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383336323832623364663161623533643538316565383539396532 Dec 13 01:49:17.605000 audit: BPF prog-id=84 op=UNLOAD Dec 13 01:49:17.605000 audit: BPF prog-id=83 op=UNLOAD Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { perfmon } for pid=2284 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit[2284]: AVC avc: denied { bpf } for pid=2284 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:17.605000 audit: BPF prog-id=85 op=LOAD Dec 13 01:49:17.605000 audit[2284]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c00020e958 items=0 ppid=2144 pid=2284 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:17.605000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6465383336323832623364663161623533643538316565383539396532 Dec 13 01:49:17.654231 env[1412]: time="2024-12-13T01:49:17.654183535Z" level=info msg="StartContainer for \"a842a1d0356183e27d00db8a9a49173f6622560626edc8c95ef2dff4a4c94b98\" returns successfully" Dec 13 01:49:17.715648 env[1412]: time="2024-12-13T01:49:17.715602507Z" level=info msg="StartContainer for \"de836282b3df1ab53d581ee8599e2a71bbaf58ce794da9d1c6bfff6e85446c00\" returns successfully" Dec 13 01:49:17.787334 kubelet[2087]: I1213 01:49:17.782482 2087 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:18.834959 kernel: kauditd_printk_skb: 559 callbacks suppressed Dec 13 01:49:18.835175 kernel: audit: type=1400 audit(1734054558.809:573): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:18.809000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:18.809000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c80f90 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:49:18.868937 kernel: audit: type=1300 audit(1734054558.809:573): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000c80f90 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:49:18.809000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:18.891943 kernel: audit: type=1327 audit(1734054558.809:573): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:18.835000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:18.916936 kernel: audit: type=1400 audit(1734054558.835:574): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:18.835000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000439980 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:49:18.946931 kernel: audit: type=1300 audit(1734054558.835:574): arch=c000003e syscall=254 success=no exit=-13 a0=8 a1=c000439980 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:49:18.835000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:18.967928 kernel: audit: type=1327 audit(1734054558.835:574): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:19.462000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:19.482936 kernel: audit: type=1400 audit(1734054559.462:575): avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:19.462000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0048375c0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:49:19.506929 kernel: audit: type=1300 audit(1734054559.462:575): arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0048375c0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:49:19.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:49:19.532251 kernel: audit: type=1327 audit(1734054559.462:575): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:49:19.462000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:19.462000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0074db060 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:49:19.553973 kernel: audit: type=1400 audit(1734054559.462:576): avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:19.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:49:19.462000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:19.462000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c004837860 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:49:19.462000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:49:19.533000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:19.533000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=81 a1=c00697f470 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:49:19.533000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:49:19.560000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:19.560000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c00407e840 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:49:19.560000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:49:19.561000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:19.561000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=42 a1=c0041e48a0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:49:19.561000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:49:19.614465 kubelet[2087]: E1213 01:49:19.614422 2087 nodelease.go:49] "Failed to get node when trying to set owner ref to the node lease" err="nodes \"ci-3510.3.6-a-92bad84337\" not found" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:19.671336 kubelet[2087]: I1213 01:49:19.671298 2087 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:19.671512 kubelet[2087]: E1213 01:49:19.671351 2087 kubelet_node_status.go:535] "Error updating node status, will retry" err="error getting node \"ci-3510.3.6-a-92bad84337\": node \"ci-3510.3.6-a-92bad84337\" not found" Dec 13 01:49:20.151856 kubelet[2087]: I1213 01:49:20.151820 2087 apiserver.go:52] "Watching apiserver" Dec 13 01:49:20.178852 kubelet[2087]: I1213 01:49:20.178805 2087 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 01:49:21.820081 systemd[1]: Reloading. Dec 13 01:49:21.851429 kubelet[2087]: W1213 01:49:21.851384 2087 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 01:49:21.914745 /usr/lib/systemd/system-generators/torcx-generator[2377]: time="2024-12-13T01:49:21Z" level=debug msg="common configuration parsed" base_dir=/var/lib/torcx/ conf_dir=/etc/torcx/ run_dir=/run/torcx/ store_paths="[/usr/share/torcx/store /usr/share/oem/torcx/store/3510.3.6 /usr/share/oem/torcx/store /var/lib/torcx/store/3510.3.6 /var/lib/torcx/store]" Dec 13 01:49:21.914782 /usr/lib/systemd/system-generators/torcx-generator[2377]: time="2024-12-13T01:49:21Z" level=info msg="torcx already run" Dec 13 01:49:22.019666 systemd[1]: /usr/lib/systemd/system/locksmithd.service:8: Unit uses CPUShares=; please use CPUWeight= instead. Support for CPUShares= will be removed soon. Dec 13 01:49:22.019686 systemd[1]: /usr/lib/systemd/system/locksmithd.service:9: Unit uses MemoryLimit=; please use MemoryMax= instead. Support for MemoryLimit= will be removed soon. Dec 13 01:49:22.036074 systemd[1]: /run/systemd/system/docker.socket:8: ListenStream= references a path below legacy directory /var/run/, updating /var/run/docker.sock → /run/docker.sock; please update the unit file accordingly. Dec 13 01:49:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.124000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.124000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit: BPF prog-id=86 op=LOAD Dec 13 01:49:22.125000 audit: BPF prog-id=47 op=UNLOAD Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit: BPF prog-id=87 op=LOAD Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.125000 audit: BPF prog-id=88 op=LOAD Dec 13 01:49:22.125000 audit: BPF prog-id=48 op=UNLOAD Dec 13 01:49:22.125000 audit: BPF prog-id=49 op=UNLOAD Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.127000 audit: BPF prog-id=89 op=LOAD Dec 13 01:49:22.128000 audit: BPF prog-id=74 op=UNLOAD Dec 13 01:49:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.129000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.129000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit: BPF prog-id=90 op=LOAD Dec 13 01:49:22.130000 audit: BPF prog-id=50 op=UNLOAD Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit: BPF prog-id=91 op=LOAD Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.130000 audit: BPF prog-id=92 op=LOAD Dec 13 01:49:22.130000 audit: BPF prog-id=51 op=UNLOAD Dec 13 01:49:22.130000 audit: BPF prog-id=52 op=UNLOAD Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.131000 audit: BPF prog-id=93 op=LOAD Dec 13 01:49:22.131000 audit: BPF prog-id=53 op=UNLOAD Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.132000 audit: BPF prog-id=94 op=LOAD Dec 13 01:49:22.132000 audit: BPF prog-id=78 op=UNLOAD Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.134000 audit: BPF prog-id=95 op=LOAD Dec 13 01:49:22.134000 audit: BPF prog-id=70 op=UNLOAD Dec 13 01:49:22.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.135000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.135000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit: BPF prog-id=96 op=LOAD Dec 13 01:49:22.136000 audit: BPF prog-id=54 op=UNLOAD Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit: BPF prog-id=97 op=LOAD Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit: BPF prog-id=98 op=LOAD Dec 13 01:49:22.136000 audit: BPF prog-id=55 op=UNLOAD Dec 13 01:49:22.136000 audit: BPF prog-id=56 op=UNLOAD Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.136000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.137000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.137000 audit: BPF prog-id=99 op=LOAD Dec 13 01:49:22.137000 audit: BPF prog-id=66 op=UNLOAD Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.139000 audit: BPF prog-id=100 op=LOAD Dec 13 01:49:22.139000 audit: BPF prog-id=57 op=UNLOAD Dec 13 01:49:22.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.140000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.140000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit: BPF prog-id=101 op=LOAD Dec 13 01:49:22.141000 audit: BPF prog-id=58 op=UNLOAD Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit: BPF prog-id=102 op=LOAD Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.141000 audit: BPF prog-id=103 op=LOAD Dec 13 01:49:22.141000 audit: BPF prog-id=59 op=UNLOAD Dec 13 01:49:22.141000 audit: BPF prog-id=60 op=UNLOAD Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.142000 audit: BPF prog-id=104 op=LOAD Dec 13 01:49:22.142000 audit: BPF prog-id=82 op=UNLOAD Dec 13 01:49:22.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.143000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit: BPF prog-id=105 op=LOAD Dec 13 01:49:22.144000 audit: BPF prog-id=62 op=UNLOAD Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.144000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.145000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.145000 audit: BPF prog-id=106 op=LOAD Dec 13 01:49:22.145000 audit: BPF prog-id=61 op=UNLOAD Dec 13 01:49:22.167492 systemd[1]: Stopping kubelet.service... Dec 13 01:49:22.186000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:22.187149 systemd[1]: kubelet.service: Deactivated successfully. Dec 13 01:49:22.187297 systemd[1]: Stopped kubelet.service. Dec 13 01:49:22.187344 systemd[1]: kubelet.service: Consumed 1.180s CPU time. Dec 13 01:49:22.189278 systemd[1]: Starting kubelet.service... Dec 13 01:49:22.369000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=kubelet comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:22.368805 systemd[1]: Started kubelet.service. Dec 13 01:49:22.411924 kubelet[2444]: Flag --container-runtime-endpoint has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:49:22.411924 kubelet[2444]: Flag --pod-infra-container-image has been deprecated, will be removed in a future release. Image garbage collector will get sandbox image information from CRI. Dec 13 01:49:22.411924 kubelet[2444]: Flag --volume-plugin-dir has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.io/docs/tasks/administer-cluster/kubelet-config-file/ for more information. Dec 13 01:49:22.411924 kubelet[2444]: I1213 01:49:22.408544 2444 server.go:206] "--pod-infra-container-image will not be pruned by the image garbage collector in kubelet and should also be set in the remote runtime" Dec 13 01:49:22.417547 kubelet[2444]: I1213 01:49:22.417516 2444 server.go:486] "Kubelet version" kubeletVersion="v1.31.0" Dec 13 01:49:22.417547 kubelet[2444]: I1213 01:49:22.417538 2444 server.go:488] "Golang settings" GOGC="" GOMAXPROCS="" GOTRACEBACK="" Dec 13 01:49:22.417790 kubelet[2444]: I1213 01:49:22.417771 2444 server.go:929] "Client rotation is on, will bootstrap in background" Dec 13 01:49:22.418886 kubelet[2444]: I1213 01:49:22.418861 2444 certificate_store.go:130] Loading cert/key pair from "/var/lib/kubelet/pki/kubelet-client-current.pem". Dec 13 01:49:22.423166 kubelet[2444]: I1213 01:49:22.423133 2444 dynamic_cafile_content.go:160] "Starting controller" name="client-ca-bundle::/etc/kubernetes/pki/ca.crt" Dec 13 01:49:22.426402 kubelet[2444]: E1213 01:49:22.426369 2444 log.go:32] "RuntimeConfig from runtime service failed" err="rpc error: code = Unimplemented desc = unknown method RuntimeConfig for service runtime.v1.RuntimeService" Dec 13 01:49:22.426488 kubelet[2444]: I1213 01:49:22.426419 2444 server.go:1403] "CRI implementation should be updated to support RuntimeConfig when KubeletCgroupDriverFromCRI feature gate has been enabled. Falling back to using cgroupDriver from kubelet config." Dec 13 01:49:22.430227 kubelet[2444]: I1213 01:49:22.430175 2444 server.go:744] "--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /" Dec 13 01:49:22.430308 kubelet[2444]: I1213 01:49:22.430290 2444 swap_util.go:113] "Swap is on" /proc/swaps contents="Filename\t\t\t\tType\t\tSize\t\tUsed\t\tPriority" Dec 13 01:49:22.430425 kubelet[2444]: I1213 01:49:22.430394 2444 container_manager_linux.go:264] "Container manager verified user specified cgroup-root exists" cgroupRoot=[] Dec 13 01:49:22.430622 kubelet[2444]: I1213 01:49:22.430422 2444 container_manager_linux.go:269] "Creating Container Manager object based on Node Config" nodeConfig={"NodeName":"ci-3510.3.6-a-92bad84337","RuntimeCgroupsName":"","SystemCgroupsName":"","KubeletCgroupsName":"","KubeletOOMScoreAdj":-999,"ContainerRuntime":"","CgroupsPerQOS":true,"CgroupRoot":"/","CgroupDriver":"systemd","KubeletRootDir":"/var/lib/kubelet","ProtectKernelDefaults":false,"KubeReservedCgroupName":"","SystemReservedCgroupName":"","ReservedSystemCPUs":{},"EnforceNodeAllocatable":{"pods":{}},"KubeReserved":null,"SystemReserved":null,"HardEvictionThresholds":[{"Signal":"nodefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.1},"GracePeriod":0,"MinReclaim":null},{"Signal":"nodefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.available","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.15},"GracePeriod":0,"MinReclaim":null},{"Signal":"imagefs.inodesFree","Operator":"LessThan","Value":{"Quantity":null,"Percentage":0.05},"GracePeriod":0,"MinReclaim":null},{"Signal":"memory.available","Operator":"LessThan","Value":{"Quantity":"100Mi","Percentage":0},"GracePeriod":0,"MinReclaim":null}],"QOSReserved":{},"CPUManagerPolicy":"none","CPUManagerPolicyOptions":null,"TopologyManagerScope":"container","CPUManagerReconcilePeriod":10000000000,"ExperimentalMemoryManagerPolicy":"None","ExperimentalMemoryManagerReservedMemory":null,"PodPidsLimit":-1,"EnforceCPULimits":true,"CPUCFSQuotaPeriod":100000000,"TopologyManagerPolicy":"none","TopologyManagerPolicyOptions":null,"CgroupVersion":2} Dec 13 01:49:22.430762 kubelet[2444]: I1213 01:49:22.430628 2444 topology_manager.go:138] "Creating topology manager with none policy" Dec 13 01:49:22.430762 kubelet[2444]: I1213 01:49:22.430643 2444 container_manager_linux.go:300] "Creating device plugin manager" Dec 13 01:49:22.430762 kubelet[2444]: I1213 01:49:22.430682 2444 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:49:22.430885 kubelet[2444]: I1213 01:49:22.430786 2444 kubelet.go:408] "Attempting to sync node with API server" Dec 13 01:49:22.430885 kubelet[2444]: I1213 01:49:22.430801 2444 kubelet.go:303] "Adding static pod path" path="/etc/kubernetes/manifests" Dec 13 01:49:22.430885 kubelet[2444]: I1213 01:49:22.430831 2444 kubelet.go:314] "Adding apiserver pod source" Dec 13 01:49:22.430885 kubelet[2444]: I1213 01:49:22.430848 2444 apiserver.go:42] "Waiting for node sync before watching apiserver pods" Dec 13 01:49:22.441350 kubelet[2444]: I1213 01:49:22.437171 2444 kuberuntime_manager.go:262] "Container runtime initialized" containerRuntime="containerd" version="1.6.16" apiVersion="v1" Dec 13 01:49:22.441350 kubelet[2444]: I1213 01:49:22.437683 2444 kubelet.go:837] "Not starting ClusterTrustBundle informer because we are in static kubelet mode" Dec 13 01:49:22.441350 kubelet[2444]: I1213 01:49:22.438148 2444 server.go:1269] "Started kubelet" Dec 13 01:49:22.443000 audit[2444]: AVC avc: denied { mac_admin } for pid=2444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.443000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:49:22.443000 audit[2444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b82000 a1=c000977380 a2=c000963fb0 a3=25 items=0 ppid=1 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:22.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:49:22.443000 audit[2444]: AVC avc: denied { mac_admin } for pid=2444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.443000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:49:22.443000 audit[2444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000b800e0 a1=c000977398 a2=c000b82090 a3=25 items=0 ppid=1 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:22.443000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:49:22.445286 kubelet[2444]: I1213 01:49:22.444771 2444 kubelet.go:1430] "Unprivileged containerized plugins might not work, could not set selinux context on plugin registration dir" path="/var/lib/kubelet/plugins_registry" err="setxattr /var/lib/kubelet/plugins_registry: invalid argument" Dec 13 01:49:22.445286 kubelet[2444]: I1213 01:49:22.444827 2444 kubelet.go:1434] "Unprivileged containerized plugins might not work, could not set selinux context on plugins dir" path="/var/lib/kubelet/plugins" err="setxattr /var/lib/kubelet/plugins: invalid argument" Dec 13 01:49:22.445286 kubelet[2444]: I1213 01:49:22.444875 2444 fs_resource_analyzer.go:67] "Starting FS ResourceAnalyzer" Dec 13 01:49:22.454887 kubelet[2444]: I1213 01:49:22.454854 2444 server.go:163] "Starting to listen" address="0.0.0.0" port=10250 Dec 13 01:49:22.456192 kubelet[2444]: I1213 01:49:22.456170 2444 server.go:460] "Adding debug handlers to kubelet server" Dec 13 01:49:22.462743 kubelet[2444]: I1213 01:49:22.462696 2444 ratelimit.go:55] "Setting rate limiting for endpoint" service="podresources" qps=100 burstTokens=10 Dec 13 01:49:22.463093 kubelet[2444]: I1213 01:49:22.463079 2444 server.go:236] "Starting to serve the podresources API" endpoint="unix:/var/lib/kubelet/pod-resources/kubelet.sock" Dec 13 01:49:22.463499 kubelet[2444]: I1213 01:49:22.463481 2444 dynamic_serving_content.go:135] "Starting controller" name="kubelet-server-cert-files::/var/lib/kubelet/pki/kubelet.crt::/var/lib/kubelet/pki/kubelet.key" Dec 13 01:49:22.468417 kubelet[2444]: I1213 01:49:22.463787 2444 volume_manager.go:289] "Starting Kubelet Volume Manager" Dec 13 01:49:22.469100 kubelet[2444]: I1213 01:49:22.463843 2444 desired_state_of_world_populator.go:146] "Desired state populator starts to run" Dec 13 01:49:22.469439 kubelet[2444]: I1213 01:49:22.469425 2444 reconciler.go:26] "Reconciler: start to sync state" Dec 13 01:49:22.470813 kubelet[2444]: I1213 01:49:22.470795 2444 factory.go:221] Registration of the systemd container factory successfully Dec 13 01:49:22.471072 kubelet[2444]: I1213 01:49:22.471045 2444 factory.go:219] Registration of the crio container factory failed: Get "http://%2Fvar%2Frun%2Fcrio%2Fcrio.sock/info": dial unix /var/run/crio/crio.sock: connect: no such file or directory Dec 13 01:49:22.472735 kubelet[2444]: I1213 01:49:22.472713 2444 factory.go:221] Registration of the containerd container factory successfully Dec 13 01:49:22.473415 kubelet[2444]: E1213 01:49:22.473392 2444 kubelet.go:1478] "Image garbage collection failed once. Stats initialization may not have completed yet" err="invalid capacity 0 on image filesystem" Dec 13 01:49:22.479689 kubelet[2444]: I1213 01:49:22.479665 2444 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv4" Dec 13 01:49:22.482871 kubelet[2444]: I1213 01:49:22.482841 2444 kubelet_network_linux.go:50] "Initialized iptables rules." protocol="IPv6" Dec 13 01:49:22.482871 kubelet[2444]: I1213 01:49:22.482873 2444 status_manager.go:217] "Starting to sync pod status with apiserver" Dec 13 01:49:22.483013 kubelet[2444]: I1213 01:49:22.482891 2444 kubelet.go:2321] "Starting kubelet main sync loop" Dec 13 01:49:22.483013 kubelet[2444]: E1213 01:49:22.482957 2444 kubelet.go:2345] "Skipping pod synchronization" err="[container runtime status check may not have completed yet, PLEG is not healthy: pleg has yet to be successful]" Dec 13 01:49:22.519055 kubelet[2444]: I1213 01:49:22.519029 2444 cpu_manager.go:214] "Starting CPU manager" policy="none" Dec 13 01:49:22.519055 kubelet[2444]: I1213 01:49:22.519045 2444 cpu_manager.go:215] "Reconciling" reconcilePeriod="10s" Dec 13 01:49:22.519055 kubelet[2444]: I1213 01:49:22.519065 2444 state_mem.go:36] "Initialized new in-memory state store" Dec 13 01:49:22.519294 kubelet[2444]: I1213 01:49:22.519227 2444 state_mem.go:88] "Updated default CPUSet" cpuSet="" Dec 13 01:49:22.519294 kubelet[2444]: I1213 01:49:22.519242 2444 state_mem.go:96] "Updated CPUSet assignments" assignments={} Dec 13 01:49:22.519294 kubelet[2444]: I1213 01:49:22.519263 2444 policy_none.go:49] "None policy: Start" Dec 13 01:49:22.521660 kubelet[2444]: I1213 01:49:22.519815 2444 memory_manager.go:170] "Starting memorymanager" policy="None" Dec 13 01:49:22.521660 kubelet[2444]: I1213 01:49:22.519840 2444 state_mem.go:35] "Initializing new in-memory state store" Dec 13 01:49:22.521660 kubelet[2444]: I1213 01:49:22.520013 2444 state_mem.go:75] "Updated machine memory state" Dec 13 01:49:22.524116 kubelet[2444]: I1213 01:49:22.524099 2444 manager.go:510] "Failed to read data from checkpoint" checkpoint="kubelet_internal_checkpoint" err="checkpoint is not found" Dec 13 01:49:22.523000 audit[2444]: AVC avc: denied { mac_admin } for pid=2444 comm="kubelet" capability=33 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:22.523000 audit: SELINUX_ERR op=setxattr invalid_context="system_u:object_r:container_file_t:s0" Dec 13 01:49:22.523000 audit[2444]: SYSCALL arch=c000003e syscall=188 success=no exit=-22 a0=c000f64090 a1=c000f03878 a2=c000f64060 a3=25 items=0 ppid=1 pid=2444 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kubelet" exe="/usr/bin/kubelet" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:22.523000 audit: PROCTITLE proctitle=2F7573722F62696E2F6B7562656C6574002D2D626F6F7473747261702D6B756265636F6E6669673D2F6574632F6B756265726E657465732F626F6F7473747261702D6B7562656C65742E636F6E66002D2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F6B7562656C65742E636F6E66002D2D636F6E6669 Dec 13 01:49:22.524771 kubelet[2444]: I1213 01:49:22.524754 2444 server.go:88] "Unprivileged containerized plugins might not work. Could not set selinux context on socket dir" path="/var/lib/kubelet/device-plugins/" err="setxattr /var/lib/kubelet/device-plugins/: invalid argument" Dec 13 01:49:22.525027 kubelet[2444]: I1213 01:49:22.525013 2444 eviction_manager.go:189] "Eviction manager: starting control loop" Dec 13 01:49:22.525188 kubelet[2444]: I1213 01:49:22.525149 2444 container_log_manager.go:189] "Initializing container log rotate workers" workers=1 monitorPeriod="10s" Dec 13 01:49:22.525800 kubelet[2444]: I1213 01:49:22.525783 2444 plugin_manager.go:118] "Starting Kubelet Plugin Manager" Dec 13 01:49:22.592409 kubelet[2444]: W1213 01:49:22.592381 2444 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 01:49:22.595441 kubelet[2444]: W1213 01:49:22.595414 2444 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 01:49:22.595807 kubelet[2444]: W1213 01:49:22.595784 2444 warnings.go:70] metadata.name: this is used in the Pod's hostname, which can result in surprising behavior; a DNS label is recommended: [must not contain dots] Dec 13 01:49:22.595897 kubelet[2444]: E1213 01:49:22.595843 2444 kubelet.go:1915] "Failed creating a mirror pod for" err="pods \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" already exists" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.632898 kubelet[2444]: I1213 01:49:22.632877 2444 kubelet_node_status.go:72] "Attempting to register node" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.643237 kubelet[2444]: I1213 01:49:22.643212 2444 kubelet_node_status.go:111] "Node was previously registered" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.643342 kubelet[2444]: I1213 01:49:22.643282 2444 kubelet_node_status.go:75] "Successfully registered node" node="ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.671423 kubelet[2444]: I1213 01:49:22.671330 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-usr-share-ca-certificates\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.671423 kubelet[2444]: I1213 01:49:22.671405 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/4674c483657777985348835a7f385890-kubeconfig\") pod \"kube-scheduler-ci-3510.3.6-a-92bad84337\" (UID: \"4674c483657777985348835a7f385890\") " pod="kube-system/kube-scheduler-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.671583 kubelet[2444]: I1213 01:49:22.671432 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/e91a6bcf3b498faffe654d59be3a939c-ca-certs\") pod \"kube-apiserver-ci-3510.3.6-a-92bad84337\" (UID: \"e91a6bcf3b498faffe654d59be3a939c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.671583 kubelet[2444]: I1213 01:49:22.671482 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/e91a6bcf3b498faffe654d59be3a939c-k8s-certs\") pod \"kube-apiserver-ci-3510.3.6-a-92bad84337\" (UID: \"e91a6bcf3b498faffe654d59be3a939c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.671583 kubelet[2444]: I1213 01:49:22.671505 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"usr-share-ca-certificates\" (UniqueName: \"kubernetes.io/host-path/e91a6bcf3b498faffe654d59be3a939c-usr-share-ca-certificates\") pod \"kube-apiserver-ci-3510.3.6-a-92bad84337\" (UID: \"e91a6bcf3b498faffe654d59be3a939c\") " pod="kube-system/kube-apiserver-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.671583 kubelet[2444]: I1213 01:49:22.671559 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvolume-dir\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-flexvolume-dir\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.671754 kubelet[2444]: I1213 01:49:22.671586 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"k8s-certs\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-k8s-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.671754 kubelet[2444]: I1213 01:49:22.671636 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"ca-certs\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-ca-certs\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.671754 kubelet[2444]: I1213 01:49:22.671659 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubeconfig\" (UniqueName: \"kubernetes.io/host-path/0494eb62d61ba9d99e4be7e326ccc2cd-kubeconfig\") pod \"kube-controller-manager-ci-3510.3.6-a-92bad84337\" (UID: \"0494eb62d61ba9d99e4be7e326ccc2cd\") " pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" Dec 13 01:49:22.872000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/opt/libexec/kubernetes/kubelet-plugins/volume/exec" dev="sda9" ino=520978 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:usr_t:s0 tclass=dir permissive=0 Dec 13 01:49:22.872000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=9 a1=c0006f28c0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:49:22.872000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:23.436467 kubelet[2444]: I1213 01:49:23.436417 2444 apiserver.go:52] "Watching apiserver" Dec 13 01:49:23.469824 kubelet[2444]: I1213 01:49:23.469784 2444 desired_state_of_world_populator.go:154] "Finished populating initial desired state of world" Dec 13 01:49:23.544747 kubelet[2444]: I1213 01:49:23.544672 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-apiserver-ci-3510.3.6-a-92bad84337" podStartSLOduration=1.544619712 podStartE2EDuration="1.544619712s" podCreationTimestamp="2024-12-13 01:49:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:23.534284482 +0000 UTC m=+1.158323357" watchObservedRunningTime="2024-12-13 01:49:23.544619712 +0000 UTC m=+1.168658587" Dec 13 01:49:23.566940 kubelet[2444]: I1213 01:49:23.565687 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-scheduler-ci-3510.3.6-a-92bad84337" podStartSLOduration=1.565666314 podStartE2EDuration="1.565666314s" podCreationTimestamp="2024-12-13 01:49:22 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:23.545481807 +0000 UTC m=+1.169520682" watchObservedRunningTime="2024-12-13 01:49:23.565666314 +0000 UTC m=+1.189705189" Dec 13 01:49:23.576000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:23.576000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00130b160 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:49:23.576000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:23.577000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:23.577000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00130b1a0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:49:23.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:23.580000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:23.580000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00130b500 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:49:23.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:23.580000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:49:23.580000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00139ba20 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:49:23.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:49:23.621347 kubelet[2444]: I1213 01:49:23.621284 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-controller-manager-ci-3510.3.6-a-92bad84337" podStartSLOduration=2.621261293 podStartE2EDuration="2.621261293s" podCreationTimestamp="2024-12-13 01:49:21 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:23.566404394 +0000 UTC m=+1.190443369" watchObservedRunningTime="2024-12-13 01:49:23.621261293 +0000 UTC m=+1.245300168" Dec 13 01:49:26.791290 kubelet[2444]: I1213 01:49:26.791253 2444 kuberuntime_manager.go:1633] "Updating runtime config through cri with podcidr" CIDR="192.168.0.0/24" Dec 13 01:49:26.791977 env[1412]: time="2024-12-13T01:49:26.791942399Z" level=info msg="No cni config template is specified, wait for other system components to drop the config." Dec 13 01:49:26.792330 kubelet[2444]: I1213 01:49:26.792165 2444 kubelet_network.go:61] "Updating Pod CIDR" originalPodCIDR="" newPodCIDR="192.168.0.0/24" Dec 13 01:49:27.762790 systemd[1]: Created slice kubepods-besteffort-pod08e9e504_b241_4223_9982_e21a293e8052.slice. Dec 13 01:49:27.797023 sudo[1839]: pam_unix(sudo:session): session closed for user root Dec 13 01:49:27.796000 audit[1839]: USER_END pid=1839 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:27.805965 kernel: kauditd_printk_skb: 287 callbacks suppressed Dec 13 01:49:27.806101 kernel: audit: type=1106 audit(1734054567.796:835): pid=1839 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_limits,pam_env,pam_unix,pam_permit,pam_systemd acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:27.806129 kubelet[2444]: I1213 01:49:27.805079 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/08e9e504-b241-4223-9982-e21a293e8052-xtables-lock\") pod \"kube-proxy-n5khb\" (UID: \"08e9e504-b241-4223-9982-e21a293e8052\") " pod="kube-system/kube-proxy-n5khb" Dec 13 01:49:27.806129 kubelet[2444]: I1213 01:49:27.805430 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/08e9e504-b241-4223-9982-e21a293e8052-lib-modules\") pod \"kube-proxy-n5khb\" (UID: \"08e9e504-b241-4223-9982-e21a293e8052\") " pod="kube-system/kube-proxy-n5khb" Dec 13 01:49:27.806129 kubelet[2444]: I1213 01:49:27.805451 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-ss56j\" (UniqueName: \"kubernetes.io/projected/08e9e504-b241-4223-9982-e21a293e8052-kube-api-access-ss56j\") pod \"kube-proxy-n5khb\" (UID: \"08e9e504-b241-4223-9982-e21a293e8052\") " pod="kube-system/kube-proxy-n5khb" Dec 13 01:49:27.806129 kubelet[2444]: I1213 01:49:27.805470 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-proxy\" (UniqueName: \"kubernetes.io/configmap/08e9e504-b241-4223-9982-e21a293e8052-kube-proxy\") pod \"kube-proxy-n5khb\" (UID: \"08e9e504-b241-4223-9982-e21a293e8052\") " pod="kube-system/kube-proxy-n5khb" Dec 13 01:49:27.825753 kernel: audit: type=1104 audit(1734054567.796:836): pid=1839 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:27.796000 audit[1839]: CRED_DISP pid=1839 uid=500 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="root" exe="/usr/bin/sudo" hostname=? addr=? terminal=? res=success' Dec 13 01:49:27.890780 systemd[1]: Created slice kubepods-besteffort-pod9b64b915_628a_48df_ad96_8df1098ae68f.slice. Dec 13 01:49:27.903103 sshd[1827]: pam_unix(sshd:session): session closed for user core Dec 13 01:49:27.903000 audit[1827]: USER_END pid=1827 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:49:27.905690 systemd[1]: sshd@6-10.200.8.26:22-10.200.16.10:43370.service: Deactivated successfully. Dec 13 01:49:27.908096 systemd[1]: session-9.scope: Deactivated successfully. Dec 13 01:49:27.925960 kernel: audit: type=1106 audit(1734054567.903:837): pid=1827 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:49:27.908235 systemd[1]: session-9.scope: Consumed 4.433s CPU time. Dec 13 01:49:27.908872 systemd-logind[1399]: Session 9 logged out. Waiting for processes to exit. Dec 13 01:49:27.909695 systemd-logind[1399]: Removed session 9. Dec 13 01:49:27.903000 audit[1827]: CRED_DISP pid=1827 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:49:27.948962 kernel: audit: type=1104 audit(1734054567.903:838): pid=1827 uid=0 auid=500 ses=9 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:49:27.904000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.26:22-10.200.16.10:43370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:27.953613 kubelet[2444]: I1213 01:49:27.953580 2444 swap_util.go:74] "error creating dir to test if tmpfs noswap is enabled. Assuming not supported" mount path="" error="stat /var/lib/kubelet/plugins/kubernetes.io/empty-dir: no such file or directory" Dec 13 01:49:27.970945 kernel: audit: type=1131 audit(1734054567.904:839): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@6-10.200.8.26:22-10.200.16.10:43370 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:49:28.008032 kubelet[2444]: I1213 01:49:28.007991 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fgtb6\" (UniqueName: \"kubernetes.io/projected/9b64b915-628a-48df-ad96-8df1098ae68f-kube-api-access-fgtb6\") pod \"tigera-operator-76c4976dd7-d92zf\" (UID: \"9b64b915-628a-48df-ad96-8df1098ae68f\") " pod="tigera-operator/tigera-operator-76c4976dd7-d92zf" Dec 13 01:49:28.008265 kubelet[2444]: I1213 01:49:28.008247 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/9b64b915-628a-48df-ad96-8df1098ae68f-var-lib-calico\") pod \"tigera-operator-76c4976dd7-d92zf\" (UID: \"9b64b915-628a-48df-ad96-8df1098ae68f\") " pod="tigera-operator/tigera-operator-76c4976dd7-d92zf" Dec 13 01:49:28.074691 env[1412]: time="2024-12-13T01:49:28.074566098Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n5khb,Uid:08e9e504-b241-4223-9982-e21a293e8052,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:28.110071 env[1412]: time="2024-12-13T01:49:28.109956482Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:28.110071 env[1412]: time="2024-12-13T01:49:28.110019888Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:28.110071 env[1412]: time="2024-12-13T01:49:28.110036390Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:28.110369 env[1412]: time="2024-12-13T01:49:28.110209107Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/7fb7709dc6b146d0b7bec350a8426b006161b8ef331405a934b73c141a47d1a0 pid=2526 runtime=io.containerd.runc.v2 Dec 13 01:49:28.144621 systemd[1]: Started cri-containerd-7fb7709dc6b146d0b7bec350a8426b006161b8ef331405a934b73c141a47d1a0.scope. Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.183593 kernel: audit: type=1400 audit(1734054568.155:840): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.183938 kernel: audit: type=1400 audit(1734054568.155:841): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.183978 kernel: audit: type=1400 audit(1734054568.155:842): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.196090 kernel: audit: type=1400 audit(1734054568.155:843): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.211295 env[1412]: time="2024-12-13T01:49:28.211230954Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-d92zf,Uid:9b64b915-628a-48df-ad96-8df1098ae68f,Namespace:tigera-operator,Attempt:0,}" Dec 13 01:49:28.226275 kernel: audit: type=1400 audit(1734054568.155:844): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.155000 audit: BPF prog-id=107 op=LOAD Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00011fc48 a2=10 a3=1c items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766623737303964633662313436643062376265633335306138343236 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00011f6b0 a2=3c a3=c items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766623737303964633662313436643062376265633335306138343236 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit: BPF prog-id=108 op=LOAD Dec 13 01:49:28.169000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011f9d8 a2=78 a3=c000191a10 items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766623737303964633662313436643062376265633335306138343236 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit: BPF prog-id=109 op=LOAD Dec 13 01:49:28.169000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00011f770 a2=78 a3=c000191a58 items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766623737303964633662313436643062376265633335306138343236 Dec 13 01:49:28.169000 audit: BPF prog-id=109 op=UNLOAD Dec 13 01:49:28.169000 audit: BPF prog-id=108 op=UNLOAD Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { perfmon } for pid=2536 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit[2536]: AVC avc: denied { bpf } for pid=2536 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.169000 audit: BPF prog-id=110 op=LOAD Dec 13 01:49:28.169000 audit[2536]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00011fc30 a2=78 a3=c000191e68 items=0 ppid=2526 pid=2536 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.169000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3766623737303964633662313436643062376265633335306138343236 Dec 13 01:49:28.240918 env[1412]: time="2024-12-13T01:49:28.240870372Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:kube-proxy-n5khb,Uid:08e9e504-b241-4223-9982-e21a293e8052,Namespace:kube-system,Attempt:0,} returns sandbox id \"7fb7709dc6b146d0b7bec350a8426b006161b8ef331405a934b73c141a47d1a0\"" Dec 13 01:49:28.244534 env[1412]: time="2024-12-13T01:49:28.243904371Z" level=info msg="CreateContainer within sandbox \"7fb7709dc6b146d0b7bec350a8426b006161b8ef331405a934b73c141a47d1a0\" for container &ContainerMetadata{Name:kube-proxy,Attempt:0,}" Dec 13 01:49:28.264134 env[1412]: time="2024-12-13T01:49:28.263962546Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:28.264134 env[1412]: time="2024-12-13T01:49:28.263993149Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:28.264134 env[1412]: time="2024-12-13T01:49:28.264008051Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:28.264464 env[1412]: time="2024-12-13T01:49:28.264183968Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/71b63c9bd460da2a3eae6589f3fa221d22d9c905f02abe2672ea5559628ca247 pid=2572 runtime=io.containerd.runc.v2 Dec 13 01:49:28.277988 systemd[1]: Started cri-containerd-71b63c9bd460da2a3eae6589f3fa221d22d9c905f02abe2672ea5559628ca247.scope. Dec 13 01:49:28.287542 env[1412]: time="2024-12-13T01:49:28.287492663Z" level=info msg="CreateContainer within sandbox \"7fb7709dc6b146d0b7bec350a8426b006161b8ef331405a934b73c141a47d1a0\" for &ContainerMetadata{Name:kube-proxy,Attempt:0,} returns container id \"d5e158130eac753374eb1f252cb5a1de52e5118a1fab13d6dc0d9e6709b197fb\"" Dec 13 01:49:28.288764 env[1412]: time="2024-12-13T01:49:28.288732685Z" level=info msg="StartContainer for \"d5e158130eac753374eb1f252cb5a1de52e5118a1fab13d6dc0d9e6709b197fb\"" Dec 13 01:49:28.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.296000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.296000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.297000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.297000 audit: BPF prog-id=111 op=LOAD Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623633633962643436306461326133656165363538396633666132 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623633633962643436306461326133656165363538396633666132 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.298000 audit: BPF prog-id=112 op=LOAD Dec 13 01:49:28.298000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c000221040 items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.298000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623633633962643436306461326133656165363538396633666132 Dec 13 01:49:28.299000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.299000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.299000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.299000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.299000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.299000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.299000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.299000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.299000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.299000 audit: BPF prog-id=113 op=LOAD Dec 13 01:49:28.299000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000221088 items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.299000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623633633962643436306461326133656165363538396633666132 Dec 13 01:49:28.300000 audit: BPF prog-id=113 op=UNLOAD Dec 13 01:49:28.300000 audit: BPF prog-id=112 op=UNLOAD Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { perfmon } for pid=2583 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit[2583]: AVC avc: denied { bpf } for pid=2583 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.300000 audit: BPF prog-id=114 op=LOAD Dec 13 01:49:28.300000 audit[2583]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000221498 items=0 ppid=2572 pid=2583 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.300000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3731623633633962643436306461326133656165363538396633666132 Dec 13 01:49:28.327342 systemd[1]: Started cri-containerd-d5e158130eac753374eb1f252cb5a1de52e5118a1fab13d6dc0d9e6709b197fb.scope. Dec 13 01:49:28.349599 env[1412]: time="2024-12-13T01:49:28.349141433Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:tigera-operator-76c4976dd7-d92zf,Uid:9b64b915-628a-48df-ad96-8df1098ae68f,Namespace:tigera-operator,Attempt:0,} returns sandbox id \"71b63c9bd460da2a3eae6589f3fa221d22d9c905f02abe2672ea5559628ca247\"" Dec 13 01:49:28.353105 env[1412]: time="2024-12-13T01:49:28.353026015Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\"" Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001176b0 a2=3c a3=7f1a54d74de8 items=0 ppid=2526 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653135383133306561633735333337346562316632353263623561 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.359000 audit: BPF prog-id=115 op=LOAD Dec 13 01:49:28.359000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001179d8 a2=78 a3=c0002807b8 items=0 ppid=2526 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.359000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653135383133306561633735333337346562316632353263623561 Dec 13 01:49:28.360000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.360000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.360000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.360000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.360000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.360000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.360000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.360000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.360000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.360000 audit: BPF prog-id=116 op=LOAD Dec 13 01:49:28.360000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000117770 a2=78 a3=c000280808 items=0 ppid=2526 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.360000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653135383133306561633735333337346562316632353263623561 Dec 13 01:49:28.361000 audit: BPF prog-id=116 op=UNLOAD Dec 13 01:49:28.361000 audit: BPF prog-id=115 op=UNLOAD Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { perfmon } for pid=2608 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit[2608]: AVC avc: denied { bpf } for pid=2608 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:28.362000 audit: BPF prog-id=117 op=LOAD Dec 13 01:49:28.362000 audit[2608]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000117c30 a2=78 a3=c000280898 items=0 ppid=2526 pid=2608 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.362000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6435653135383133306561633735333337346562316632353263623561 Dec 13 01:49:28.377609 env[1412]: time="2024-12-13T01:49:28.377564332Z" level=info msg="StartContainer for \"d5e158130eac753374eb1f252cb5a1de52e5118a1fab13d6dc0d9e6709b197fb\" returns successfully" Dec 13 01:49:28.527174 kubelet[2444]: I1213 01:49:28.527099 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/kube-proxy-n5khb" podStartSLOduration=1.527074453 podStartE2EDuration="1.527074453s" podCreationTimestamp="2024-12-13 01:49:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:49:28.526785924 +0000 UTC m=+6.150824899" watchObservedRunningTime="2024-12-13 01:49:28.527074453 +0000 UTC m=+6.151113328" Dec 13 01:49:28.579000 audit[2675]: NETFILTER_CFG table=mangle:42 family=10 entries=1 op=nft_register_chain pid=2675 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.579000 audit[2675]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffebd33fa80 a2=0 a3=7ffebd33fa6c items=0 ppid=2621 pid=2675 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.579000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:49:28.582000 audit[2676]: NETFILTER_CFG table=mangle:43 family=2 entries=1 op=nft_register_chain pid=2676 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.582000 audit[2676]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffcda873820 a2=0 a3=7ffcda87380c items=0 ppid=2621 pid=2676 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.582000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006D616E676C65 Dec 13 01:49:28.584000 audit[2678]: NETFILTER_CFG table=nat:44 family=2 entries=1 op=nft_register_chain pid=2678 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.584000 audit[2678]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff901092f0 a2=0 a3=7fff901092dc items=0 ppid=2621 pid=2678 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.584000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:49:28.585000 audit[2677]: NETFILTER_CFG table=nat:45 family=10 entries=1 op=nft_register_chain pid=2677 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.585000 audit[2677]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff79b2fc10 a2=0 a3=7fff79b2fbfc items=0 ppid=2621 pid=2677 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.585000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D74006E6174 Dec 13 01:49:28.586000 audit[2680]: NETFILTER_CFG table=filter:46 family=10 entries=1 op=nft_register_chain pid=2680 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.586000 audit[2680]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffdf1d99f60 a2=0 a3=7ffdf1d99f4c items=0 ppid=2621 pid=2680 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.586000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:49:28.589000 audit[2679]: NETFILTER_CFG table=filter:47 family=2 entries=1 op=nft_register_chain pid=2679 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.589000 audit[2679]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd1afd50b0 a2=0 a3=a4037d6a1677a440 items=0 ppid=2621 pid=2679 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.589000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D43414E415259002D740066696C746572 Dec 13 01:49:28.679000 audit[2681]: NETFILTER_CFG table=filter:48 family=2 entries=1 op=nft_register_chain pid=2681 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.679000 audit[2681]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffe8bd7c6c0 a2=0 a3=7ffe8bd7c6ac items=0 ppid=2621 pid=2681 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.679000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:49:28.682000 audit[2683]: NETFILTER_CFG table=filter:49 family=2 entries=1 op=nft_register_rule pid=2683 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.682000 audit[2683]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffceff67560 a2=0 a3=7ffceff6754c items=0 ppid=2621 pid=2683 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.682000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276696365 Dec 13 01:49:28.685000 audit[2686]: NETFILTER_CFG table=filter:50 family=2 entries=1 op=nft_register_rule pid=2686 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.685000 audit[2686]: SYSCALL arch=c000003e syscall=46 success=yes exit=752 a0=3 a1=7ffd2dae9a40 a2=0 a3=7ffd2dae9a2c items=0 ppid=2621 pid=2686 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.685000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C65207365727669 Dec 13 01:49:28.687000 audit[2687]: NETFILTER_CFG table=filter:51 family=2 entries=1 op=nft_register_chain pid=2687 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.687000 audit[2687]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffe38a9d5b0 a2=0 a3=7ffe38a9d59c items=0 ppid=2621 pid=2687 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.687000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:49:28.689000 audit[2689]: NETFILTER_CFG table=filter:52 family=2 entries=1 op=nft_register_rule pid=2689 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.689000 audit[2689]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffc8bcd7900 a2=0 a3=7ffc8bcd78ec items=0 ppid=2621 pid=2689 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.689000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:49:28.690000 audit[2690]: NETFILTER_CFG table=filter:53 family=2 entries=1 op=nft_register_chain pid=2690 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.690000 audit[2690]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc2bb4c470 a2=0 a3=7ffc2bb4c45c items=0 ppid=2621 pid=2690 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.690000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:49:28.693000 audit[2692]: NETFILTER_CFG table=filter:54 family=2 entries=1 op=nft_register_rule pid=2692 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.693000 audit[2692]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffe96dd7890 a2=0 a3=7ffe96dd787c items=0 ppid=2621 pid=2692 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.693000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:49:28.696000 audit[2695]: NETFILTER_CFG table=filter:55 family=2 entries=1 op=nft_register_rule pid=2695 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.696000 audit[2695]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffd256ba820 a2=0 a3=7ffd256ba80c items=0 ppid=2621 pid=2695 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.696000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D53 Dec 13 01:49:28.697000 audit[2696]: NETFILTER_CFG table=filter:56 family=2 entries=1 op=nft_register_chain pid=2696 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.697000 audit[2696]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fffb6ea9a30 a2=0 a3=7fffb6ea9a1c items=0 ppid=2621 pid=2696 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.697000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:49:28.700000 audit[2698]: NETFILTER_CFG table=filter:57 family=2 entries=1 op=nft_register_rule pid=2698 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.700000 audit[2698]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffcfda4e4b0 a2=0 a3=7ffcfda4e49c items=0 ppid=2621 pid=2698 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.700000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:49:28.701000 audit[2699]: NETFILTER_CFG table=filter:58 family=2 entries=1 op=nft_register_chain pid=2699 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.701000 audit[2699]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7fff5772e6f0 a2=0 a3=7fff5772e6dc items=0 ppid=2621 pid=2699 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.701000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:49:28.704000 audit[2701]: NETFILTER_CFG table=filter:59 family=2 entries=1 op=nft_register_rule pid=2701 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.704000 audit[2701]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffeaf607b50 a2=0 a3=7ffeaf607b3c items=0 ppid=2621 pid=2701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.704000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:49:28.707000 audit[2704]: NETFILTER_CFG table=filter:60 family=2 entries=1 op=nft_register_rule pid=2704 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.707000 audit[2704]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc7bbca470 a2=0 a3=7ffc7bbca45c items=0 ppid=2621 pid=2704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.707000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:49:28.711000 audit[2707]: NETFILTER_CFG table=filter:61 family=2 entries=1 op=nft_register_rule pid=2707 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.711000 audit[2707]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffdd5bf5040 a2=0 a3=7ffdd5bf502c items=0 ppid=2621 pid=2707 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.711000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:49:28.713000 audit[2708]: NETFILTER_CFG table=nat:62 family=2 entries=1 op=nft_register_chain pid=2708 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.713000 audit[2708]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7fffe9c15af0 a2=0 a3=7fffe9c15adc items=0 ppid=2621 pid=2708 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.713000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:49:28.717000 audit[2711]: NETFILTER_CFG table=nat:63 family=2 entries=1 op=nft_register_rule pid=2711 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.717000 audit[2711]: SYSCALL arch=c000003e syscall=46 success=yes exit=524 a0=3 a1=7ffdd1ff7e70 a2=0 a3=7ffdd1ff7e5c items=0 ppid=2621 pid=2711 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.717000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:49:28.721000 audit[2714]: NETFILTER_CFG table=nat:64 family=2 entries=1 op=nft_register_rule pid=2714 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.721000 audit[2714]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffdfd840820 a2=0 a3=7ffdfd84080c items=0 ppid=2621 pid=2714 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.721000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:49:28.722000 audit[2715]: NETFILTER_CFG table=nat:65 family=2 entries=1 op=nft_register_chain pid=2715 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.722000 audit[2715]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffc135da690 a2=0 a3=7ffc135da67c items=0 ppid=2621 pid=2715 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.722000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:49:28.724000 audit[2717]: NETFILTER_CFG table=nat:66 family=2 entries=1 op=nft_register_rule pid=2717 subj=system_u:system_r:kernel_t:s0 comm="iptables" Dec 13 01:49:28.724000 audit[2717]: SYSCALL arch=c000003e syscall=46 success=yes exit=532 a0=3 a1=7ffc1784b660 a2=0 a3=7ffc1784b64c items=0 ppid=2621 pid=2717 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.724000 audit: PROCTITLE proctitle=69707461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:49:28.858000 audit[2723]: NETFILTER_CFG table=filter:67 family=2 entries=8 op=nft_register_rule pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:28.858000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=5248 a0=3 a1=7ffdedd999f0 a2=0 a3=7ffdedd999dc items=0 ppid=2621 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.858000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:28.924000 audit[2723]: NETFILTER_CFG table=nat:68 family=2 entries=14 op=nft_register_chain pid=2723 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:28.924000 audit[2723]: SYSCALL arch=c000003e syscall=46 success=yes exit=5508 a0=3 a1=7ffdedd999f0 a2=0 a3=7ffdedd999dc items=0 ppid=2621 pid=2723 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.924000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:28.926000 audit[2728]: NETFILTER_CFG table=filter:69 family=10 entries=1 op=nft_register_chain pid=2728 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.926000 audit[2728]: SYSCALL arch=c000003e syscall=46 success=yes exit=108 a0=3 a1=7ffde3a501c0 a2=0 a3=7ffde3a501ac items=0 ppid=2621 pid=2728 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.926000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D45585445524E414C2D5345525649434553002D740066696C746572 Dec 13 01:49:28.929000 audit[2730]: NETFILTER_CFG table=filter:70 family=10 entries=2 op=nft_register_chain pid=2730 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.929000 audit[2730]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7ffe66bcf2b0 a2=0 a3=7ffe66bcf29c items=0 ppid=2621 pid=2730 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.929000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C6520736572766963 Dec 13 01:49:28.933000 audit[2733]: NETFILTER_CFG table=filter:71 family=10 entries=2 op=nft_register_chain pid=2733 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.933000 audit[2733]: SYSCALL arch=c000003e syscall=46 success=yes exit=836 a0=3 a1=7fff1c2c38f0 a2=0 a3=7fff1c2c38dc items=0 ppid=2621 pid=2733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.933000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E657465732065787465726E616C6C792D76697369626C652073657276 Dec 13 01:49:28.934000 audit[2734]: NETFILTER_CFG table=filter:72 family=10 entries=1 op=nft_register_chain pid=2734 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.934000 audit[2734]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd01dc8160 a2=0 a3=7ffd01dc814c items=0 ppid=2621 pid=2734 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.934000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4E4F4445504F525453002D740066696C746572 Dec 13 01:49:28.937000 audit[2736]: NETFILTER_CFG table=filter:73 family=10 entries=1 op=nft_register_rule pid=2736 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.937000 audit[2736]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffe92931e40 a2=0 a3=7ffe92931e2c items=0 ppid=2621 pid=2736 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.937000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206865616C746820636865636B207365727669636520706F727473002D6A004B5542452D4E4F4445504F525453 Dec 13 01:49:28.938000 audit[2737]: NETFILTER_CFG table=filter:74 family=10 entries=1 op=nft_register_chain pid=2737 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.938000 audit[2737]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffdaa974e90 a2=0 a3=7ffdaa974e7c items=0 ppid=2621 pid=2737 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.938000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D740066696C746572 Dec 13 01:49:28.941000 audit[2739]: NETFILTER_CFG table=filter:75 family=10 entries=1 op=nft_register_rule pid=2739 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.941000 audit[2739]: SYSCALL arch=c000003e syscall=46 success=yes exit=744 a0=3 a1=7ffefe228170 a2=0 a3=7ffefe22815c items=0 ppid=2621 pid=2739 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.941000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B554245 Dec 13 01:49:28.944000 audit[2742]: NETFILTER_CFG table=filter:76 family=10 entries=2 op=nft_register_chain pid=2742 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.944000 audit[2742]: SYSCALL arch=c000003e syscall=46 success=yes exit=828 a0=3 a1=7ffc04cab370 a2=0 a3=7ffc04cab35c items=0 ppid=2621 pid=2742 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.944000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D Dec 13 01:49:28.945000 audit[2743]: NETFILTER_CFG table=filter:77 family=10 entries=1 op=nft_register_chain pid=2743 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.945000 audit[2743]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffcb3cda5b0 a2=0 a3=7ffcb3cda59c items=0 ppid=2621 pid=2743 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.945000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D464F5257415244002D740066696C746572 Dec 13 01:49:28.948000 audit[2745]: NETFILTER_CFG table=filter:78 family=10 entries=1 op=nft_register_rule pid=2745 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.948000 audit[2745]: SYSCALL arch=c000003e syscall=46 success=yes exit=528 a0=3 a1=7ffd6a903940 a2=0 a3=7ffd6a90392c items=0 ppid=2621 pid=2745 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.948000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320666F7277617264696E672072756C6573002D6A004B5542452D464F5257415244 Dec 13 01:49:28.949000 audit[2746]: NETFILTER_CFG table=filter:79 family=10 entries=1 op=nft_register_chain pid=2746 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.949000 audit[2746]: SYSCALL arch=c000003e syscall=46 success=yes exit=104 a0=3 a1=7ffd551414d0 a2=0 a3=7ffd551414bc items=0 ppid=2621 pid=2746 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.949000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D50524F58592D4649524557414C4C002D740066696C746572 Dec 13 01:49:28.951000 audit[2748]: NETFILTER_CFG table=filter:80 family=10 entries=1 op=nft_register_rule pid=2748 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.951000 audit[2748]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7fff09404bf0 a2=0 a3=7fff09404bdc items=0 ppid=2621 pid=2748 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.951000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D6A Dec 13 01:49:28.955000 audit[2751]: NETFILTER_CFG table=filter:81 family=10 entries=1 op=nft_register_rule pid=2751 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.955000 audit[2751]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffc38eaed60 a2=0 a3=7ffc38eaed4c items=0 ppid=2621 pid=2751 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.955000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C002D Dec 13 01:49:28.959000 audit[2754]: NETFILTER_CFG table=filter:82 family=10 entries=1 op=nft_register_rule pid=2754 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.959000 audit[2754]: SYSCALL arch=c000003e syscall=46 success=yes exit=748 a0=3 a1=7ffd14b06020 a2=0 a3=7ffd14b0600c items=0 ppid=2621 pid=2754 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.959000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900464F5257415244002D740066696C746572002D6D00636F6E6E747261636B002D2D63747374617465004E4557002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573206C6F61642062616C616E636572206669726577616C6C Dec 13 01:49:28.960000 audit[2755]: NETFILTER_CFG table=nat:83 family=10 entries=1 op=nft_register_chain pid=2755 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.960000 audit[2755]: SYSCALL arch=c000003e syscall=46 success=yes exit=96 a0=3 a1=7ffd80b85360 a2=0 a3=7ffd80b8534c items=0 ppid=2621 pid=2755 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.960000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D5345525649434553002D74006E6174 Dec 13 01:49:28.962000 audit[2757]: NETFILTER_CFG table=nat:84 family=10 entries=2 op=nft_register_chain pid=2757 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.962000 audit[2757]: SYSCALL arch=c000003e syscall=46 success=yes exit=600 a0=3 a1=7ffc3f1935c0 a2=0 a3=7ffc3f1935ac items=0 ppid=2621 pid=2757 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.962000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:49:28.966000 audit[2760]: NETFILTER_CFG table=nat:85 family=10 entries=2 op=nft_register_chain pid=2760 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.966000 audit[2760]: SYSCALL arch=c000003e syscall=46 success=yes exit=608 a0=3 a1=7ffe5c9b6c80 a2=0 a3=7ffe5c9b6c6c items=0 ppid=2621 pid=2760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.966000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900505245524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E65746573207365727669636520706F7274616C73002D6A004B5542452D5345525649434553 Dec 13 01:49:28.967000 audit[2761]: NETFILTER_CFG table=nat:86 family=10 entries=1 op=nft_register_chain pid=2761 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.967000 audit[2761]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7fff071c5230 a2=0 a3=7fff071c521c items=0 ppid=2621 pid=2761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.967000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D504F5354524F5554494E47002D74006E6174 Dec 13 01:49:28.969000 audit[2763]: NETFILTER_CFG table=nat:87 family=10 entries=2 op=nft_register_chain pid=2763 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.969000 audit[2763]: SYSCALL arch=c000003e syscall=46 success=yes exit=612 a0=3 a1=7ffcb6903e80 a2=0 a3=7ffcb6903e6c items=0 ppid=2621 pid=2763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.969000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900504F5354524F5554494E47002D74006E6174002D6D00636F6D6D656E74002D2D636F6D6D656E74006B756265726E6574657320706F7374726F7574696E672072756C6573002D6A004B5542452D504F5354524F5554494E47 Dec 13 01:49:28.971000 audit[2764]: NETFILTER_CFG table=filter:88 family=10 entries=1 op=nft_register_chain pid=2764 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.971000 audit[2764]: SYSCALL arch=c000003e syscall=46 success=yes exit=100 a0=3 a1=7ffd64ea6ff0 a2=0 a3=7ffd64ea6fdc items=0 ppid=2621 pid=2764 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.971000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4E004B5542452D4649524557414C4C002D740066696C746572 Dec 13 01:49:28.979200 systemd[1]: run-containerd-runc-k8s.io-7fb7709dc6b146d0b7bec350a8426b006161b8ef331405a934b73c141a47d1a0-runc.oCXkqT.mount: Deactivated successfully. Dec 13 01:49:28.983000 audit[2766]: NETFILTER_CFG table=filter:89 family=10 entries=1 op=nft_register_rule pid=2766 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.983000 audit[2766]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd517a9410 a2=0 a3=7ffd517a93fc items=0 ppid=2621 pid=2766 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.983000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D4900494E505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:49:28.987000 audit[2769]: NETFILTER_CFG table=filter:90 family=10 entries=1 op=nft_register_rule pid=2769 subj=system_u:system_r:kernel_t:s0 comm="ip6tables" Dec 13 01:49:28.987000 audit[2769]: SYSCALL arch=c000003e syscall=46 success=yes exit=228 a0=3 a1=7ffd1cb5f5c0 a2=0 a3=7ffd1cb5f5ac items=0 ppid=2621 pid=2769 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.987000 audit: PROCTITLE proctitle=6970367461626C6573002D770035002D5700313030303030002D49004F5554505554002D740066696C746572002D6A004B5542452D4649524557414C4C Dec 13 01:49:28.990000 audit[2771]: NETFILTER_CFG table=filter:91 family=10 entries=3 op=nft_register_rule pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:49:28.990000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=2088 a0=3 a1=7fff587850b0 a2=0 a3=7fff5878509c items=0 ppid=2621 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.990000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:28.990000 audit[2771]: NETFILTER_CFG table=nat:92 family=10 entries=7 op=nft_register_chain pid=2771 subj=system_u:system_r:kernel_t:s0 comm="ip6tables-resto" Dec 13 01:49:28.990000 audit[2771]: SYSCALL arch=c000003e syscall=46 success=yes exit=2056 a0=3 a1=7fff587850b0 a2=0 a3=7fff5878509c items=0 ppid=2621 pid=2771 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="ip6tables-resto" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:28.990000 audit: PROCTITLE proctitle=6970367461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:30.896743 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1565005536.mount: Deactivated successfully. Dec 13 01:49:31.563847 env[1412]: time="2024-12-13T01:49:31.563795073Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:31.569975 env[1412]: time="2024-12-13T01:49:31.569929241Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:31.573451 env[1412]: time="2024-12-13T01:49:31.573413464Z" level=info msg="ImageUpdate event &ImageUpdate{Name:quay.io/tigera/operator:v1.36.2,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:31.576063 env[1412]: time="2024-12-13T01:49:31.576031407Z" level=info msg="ImageCreate event &ImageCreate{Name:quay.io/tigera/operator@sha256:fc9ea45f2475fd99db1b36d2ff180a50017b1a5ea0e82a171c6b439b3a620764,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:31.576557 env[1412]: time="2024-12-13T01:49:31.576519052Z" level=info msg="PullImage \"quay.io/tigera/operator:v1.36.2\" returns image reference \"sha256:3045aa4a360d468ed15090f280e94c54bf4678269a6e863a9ebcf5b31534a346\"" Dec 13 01:49:31.580063 env[1412]: time="2024-12-13T01:49:31.580021977Z" level=info msg="CreateContainer within sandbox \"71b63c9bd460da2a3eae6589f3fa221d22d9c905f02abe2672ea5559628ca247\" for container &ContainerMetadata{Name:tigera-operator,Attempt:0,}" Dec 13 01:49:31.601947 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount774894414.mount: Deactivated successfully. Dec 13 01:49:31.616259 env[1412]: time="2024-12-13T01:49:31.616212632Z" level=info msg="CreateContainer within sandbox \"71b63c9bd460da2a3eae6589f3fa221d22d9c905f02abe2672ea5559628ca247\" for &ContainerMetadata{Name:tigera-operator,Attempt:0,} returns container id \"a09440c97ce05d5ad9bf7bb2d6a6b883ae428edcf64b21d940c62bd47ef14b95\"" Dec 13 01:49:31.617447 env[1412]: time="2024-12-13T01:49:31.616785686Z" level=info msg="StartContainer for \"a09440c97ce05d5ad9bf7bb2d6a6b883ae428edcf64b21d940c62bd47ef14b95\"" Dec 13 01:49:31.633777 systemd[1]: Started cri-containerd-a09440c97ce05d5ad9bf7bb2d6a6b883ae428edcf64b21d940c62bd47ef14b95.scope. Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit: BPF prog-id=118 op=LOAD Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000149c48 a2=10 a3=1c items=0 ppid=2572 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393434306339376365303564356164396266376262326436613662 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001496b0 a2=3c a3=8 items=0 ppid=2572 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393434306339376365303564356164396266376262326436613662 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.646000 audit: BPF prog-id=119 op=LOAD Dec 13 01:49:31.646000 audit[2780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001499d8 a2=78 a3=c000383dc0 items=0 ppid=2572 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.646000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393434306339376365303564356164396266376262326436613662 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit: BPF prog-id=120 op=LOAD Dec 13 01:49:31.647000 audit[2780]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000149770 a2=78 a3=c000383e08 items=0 ppid=2572 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393434306339376365303564356164396266376262326436613662 Dec 13 01:49:31.647000 audit: BPF prog-id=120 op=UNLOAD Dec 13 01:49:31.647000 audit: BPF prog-id=119 op=UNLOAD Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { perfmon } for pid=2780 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit[2780]: AVC avc: denied { bpf } for pid=2780 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:31.647000 audit: BPF prog-id=121 op=LOAD Dec 13 01:49:31.647000 audit[2780]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000149c30 a2=78 a3=c0003e0218 items=0 ppid=2572 pid=2780 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:31.647000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6130393434306339376365303564356164396266376262326436613662 Dec 13 01:49:31.665864 env[1412]: time="2024-12-13T01:49:31.665818432Z" level=info msg="StartContainer for \"a09440c97ce05d5ad9bf7bb2d6a6b883ae428edcf64b21d940c62bd47ef14b95\" returns successfully" Dec 13 01:49:31.851590 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2139434012.mount: Deactivated successfully. Dec 13 01:49:32.584758 kubelet[2444]: I1213 01:49:32.584705 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="tigera-operator/tigera-operator-76c4976dd7-d92zf" podStartSLOduration=2.35675461 podStartE2EDuration="5.584688674s" podCreationTimestamp="2024-12-13 01:49:27 +0000 UTC" firstStartedPulling="2024-12-13 01:49:28.350349952 +0000 UTC m=+5.974388827" lastFinishedPulling="2024-12-13 01:49:31.578284016 +0000 UTC m=+9.202322891" observedRunningTime="2024-12-13 01:49:32.529437551 +0000 UTC m=+10.153476426" watchObservedRunningTime="2024-12-13 01:49:32.584688674 +0000 UTC m=+10.208727949" Dec 13 01:49:34.854000 audit[2812]: NETFILTER_CFG table=filter:93 family=2 entries=15 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:34.865964 kernel: kauditd_printk_skb: 362 callbacks suppressed Dec 13 01:49:34.866067 kernel: audit: type=1325 audit(1734054574.854:951): table=filter:93 family=2 entries=15 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:34.854000 audit[2812]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcff041e80 a2=0 a3=7ffcff041e6c items=0 ppid=2621 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.903584 kernel: audit: type=1300 audit(1734054574.854:951): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffcff041e80 a2=0 a3=7ffcff041e6c items=0 ppid=2621 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.854000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:34.913296 kernel: audit: type=1327 audit(1734054574.854:951): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:34.903000 audit[2812]: NETFILTER_CFG table=nat:94 family=2 entries=12 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:34.925938 kernel: audit: type=1325 audit(1734054574.903:952): table=nat:94 family=2 entries=12 op=nft_register_rule pid=2812 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:34.903000 audit[2812]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcff041e80 a2=0 a3=0 items=0 ppid=2621 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.951943 kernel: audit: type=1300 audit(1734054574.903:952): arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffcff041e80 a2=0 a3=0 items=0 ppid=2621 pid=2812 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:34.903000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:34.964946 kernel: audit: type=1327 audit(1734054574.903:952): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:35.054000 audit[2814]: NETFILTER_CFG table=filter:95 family=2 entries=16 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:35.066932 kernel: audit: type=1325 audit(1734054575.054:953): table=filter:95 family=2 entries=16 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:35.054000 audit[2814]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd54f60320 a2=0 a3=7ffd54f6030c items=0 ppid=2621 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.088935 kernel: audit: type=1300 audit(1734054575.054:953): arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd54f60320 a2=0 a3=7ffd54f6030c items=0 ppid=2621 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.054000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:35.099951 kernel: audit: type=1327 audit(1734054575.054:953): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:35.104000 audit[2814]: NETFILTER_CFG table=nat:96 family=2 entries=12 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:35.117395 kernel: audit: type=1325 audit(1734054575.104:954): table=nat:96 family=2 entries=12 op=nft_register_rule pid=2814 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:35.104000 audit[2814]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffd54f60320 a2=0 a3=0 items=0 ppid=2621 pid=2814 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.104000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:35.155347 systemd[1]: Created slice kubepods-besteffort-pod025fc5f7_7bb5_4c4c_a9da_39653ecf3325.slice. Dec 13 01:49:35.261197 systemd[1]: Created slice kubepods-besteffort-podb9a93461_0427_47b2_bbf6_5a6c8cc93619.slice. Dec 13 01:49:35.269706 kubelet[2444]: I1213 01:49:35.269666 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/025fc5f7-7bb5-4c4c-a9da-39653ecf3325-tigera-ca-bundle\") pod \"calico-typha-7885bd88cb-tct2l\" (UID: \"025fc5f7-7bb5-4c4c-a9da-39653ecf3325\") " pod="calico-system/calico-typha-7885bd88cb-tct2l" Dec 13 01:49:35.270237 kubelet[2444]: I1213 01:49:35.270197 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"typha-certs\" (UniqueName: \"kubernetes.io/secret/025fc5f7-7bb5-4c4c-a9da-39653ecf3325-typha-certs\") pod \"calico-typha-7885bd88cb-tct2l\" (UID: \"025fc5f7-7bb5-4c4c-a9da-39653ecf3325\") " pod="calico-system/calico-typha-7885bd88cb-tct2l" Dec 13 01:49:35.270437 kubelet[2444]: I1213 01:49:35.270419 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-rj4m6\" (UniqueName: \"kubernetes.io/projected/025fc5f7-7bb5-4c4c-a9da-39653ecf3325-kube-api-access-rj4m6\") pod \"calico-typha-7885bd88cb-tct2l\" (UID: \"025fc5f7-7bb5-4c4c-a9da-39653ecf3325\") " pod="calico-system/calico-typha-7885bd88cb-tct2l" Dec 13 01:49:35.371039 kubelet[2444]: I1213 01:49:35.370902 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"lib-modules\" (UniqueName: \"kubernetes.io/host-path/b9a93461-0427-47b2-bbf6-5a6c8cc93619-lib-modules\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.372724 kubelet[2444]: I1213 01:49:35.372090 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-run-calico\" (UniqueName: \"kubernetes.io/host-path/b9a93461-0427-47b2-bbf6-5a6c8cc93619-var-run-calico\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.373121 kubelet[2444]: I1213 01:49:35.373096 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"var-lib-calico\" (UniqueName: \"kubernetes.io/host-path/b9a93461-0427-47b2-bbf6-5a6c8cc93619-var-lib-calico\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.373293 kubelet[2444]: I1213 01:49:35.373274 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"policysync\" (UniqueName: \"kubernetes.io/host-path/b9a93461-0427-47b2-bbf6-5a6c8cc93619-policysync\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.373434 kubelet[2444]: I1213 01:49:35.373417 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"node-certs\" (UniqueName: \"kubernetes.io/secret/b9a93461-0427-47b2-bbf6-5a6c8cc93619-node-certs\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.373562 kubelet[2444]: I1213 01:49:35.373547 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-log-dir\" (UniqueName: \"kubernetes.io/host-path/b9a93461-0427-47b2-bbf6-5a6c8cc93619-cni-log-dir\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.373683 kubelet[2444]: I1213 01:49:35.373667 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"xtables-lock\" (UniqueName: \"kubernetes.io/host-path/b9a93461-0427-47b2-bbf6-5a6c8cc93619-xtables-lock\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.373853 kubelet[2444]: I1213 01:49:35.373832 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-8mjbf\" (UniqueName: \"kubernetes.io/projected/b9a93461-0427-47b2-bbf6-5a6c8cc93619-kube-api-access-8mjbf\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.374397 kubelet[2444]: I1213 01:49:35.374377 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/b9a93461-0427-47b2-bbf6-5a6c8cc93619-tigera-ca-bundle\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.374516 kubelet[2444]: I1213 01:49:35.374501 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-bin-dir\" (UniqueName: \"kubernetes.io/host-path/b9a93461-0427-47b2-bbf6-5a6c8cc93619-cni-bin-dir\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.374635 kubelet[2444]: I1213 01:49:35.374621 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"flexvol-driver-host\" (UniqueName: \"kubernetes.io/host-path/b9a93461-0427-47b2-bbf6-5a6c8cc93619-flexvol-driver-host\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.374751 kubelet[2444]: I1213 01:49:35.374736 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"cni-net-dir\" (UniqueName: \"kubernetes.io/host-path/b9a93461-0427-47b2-bbf6-5a6c8cc93619-cni-net-dir\") pod \"calico-node-vtqch\" (UID: \"b9a93461-0427-47b2-bbf6-5a6c8cc93619\") " pod="calico-system/calico-node-vtqch" Dec 13 01:49:35.374843 kubelet[2444]: E1213 01:49:35.371625 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t2mmp" podUID="dee8dd51-2759-489b-acfd-de00febc629a" Dec 13 01:49:35.462853 env[1412]: time="2024-12-13T01:49:35.462317188Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7885bd88cb-tct2l,Uid:025fc5f7-7bb5-4c4c-a9da-39653ecf3325,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:35.475274 kubelet[2444]: I1213 01:49:35.475240 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"registration-dir\" (UniqueName: \"kubernetes.io/host-path/dee8dd51-2759-489b-acfd-de00febc629a-registration-dir\") pod \"csi-node-driver-t2mmp\" (UID: \"dee8dd51-2759-489b-acfd-de00febc629a\") " pod="calico-system/csi-node-driver-t2mmp" Dec 13 01:49:35.476211 kubelet[2444]: I1213 01:49:35.476184 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kubelet-dir\" (UniqueName: \"kubernetes.io/host-path/dee8dd51-2759-489b-acfd-de00febc629a-kubelet-dir\") pod \"csi-node-driver-t2mmp\" (UID: \"dee8dd51-2759-489b-acfd-de00febc629a\") " pod="calico-system/csi-node-driver-t2mmp" Dec 13 01:49:35.476380 kubelet[2444]: I1213 01:49:35.476359 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"varrun\" (UniqueName: \"kubernetes.io/host-path/dee8dd51-2759-489b-acfd-de00febc629a-varrun\") pod \"csi-node-driver-t2mmp\" (UID: \"dee8dd51-2759-489b-acfd-de00febc629a\") " pod="calico-system/csi-node-driver-t2mmp" Dec 13 01:49:35.476579 kubelet[2444]: I1213 01:49:35.476558 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-fcmsd\" (UniqueName: \"kubernetes.io/projected/dee8dd51-2759-489b-acfd-de00febc629a-kube-api-access-fcmsd\") pod \"csi-node-driver-t2mmp\" (UID: \"dee8dd51-2759-489b-acfd-de00febc629a\") " pod="calico-system/csi-node-driver-t2mmp" Dec 13 01:49:35.476701 kubelet[2444]: I1213 01:49:35.476684 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"socket-dir\" (UniqueName: \"kubernetes.io/host-path/dee8dd51-2759-489b-acfd-de00febc629a-socket-dir\") pod \"csi-node-driver-t2mmp\" (UID: \"dee8dd51-2759-489b-acfd-de00febc629a\") " pod="calico-system/csi-node-driver-t2mmp" Dec 13 01:49:35.489024 kubelet[2444]: E1213 01:49:35.488988 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.489173 kubelet[2444]: W1213 01:49:35.489156 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.489276 kubelet[2444]: E1213 01:49:35.489262 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.522724 kubelet[2444]: E1213 01:49:35.522699 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.522906 kubelet[2444]: W1213 01:49:35.522887 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.523021 kubelet[2444]: E1213 01:49:35.523006 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.531777 env[1412]: time="2024-12-13T01:49:35.531569834Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:35.531777 env[1412]: time="2024-12-13T01:49:35.531613938Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:35.531777 env[1412]: time="2024-12-13T01:49:35.531628639Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:35.537974 env[1412]: time="2024-12-13T01:49:35.532041874Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/398f0ee5e94bad8a00d00d462cfe7b450178010ad9e36eb5c16476cbb6a0d1c6 pid=2826 runtime=io.containerd.runc.v2 Dec 13 01:49:35.558884 systemd[1]: Started cri-containerd-398f0ee5e94bad8a00d00d462cfe7b450178010ad9e36eb5c16476cbb6a0d1c6.scope. Dec 13 01:49:35.565483 env[1412]: time="2024-12-13T01:49:35.565421440Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vtqch,Uid:b9a93461-0427-47b2-bbf6-5a6c8cc93619,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:35.574805 kubelet[2444]: E1213 01:49:35.574638 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.574805 kubelet[2444]: W1213 01:49:35.574663 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.574805 kubelet[2444]: E1213 01:49:35.574690 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.575239 kubelet[2444]: E1213 01:49:35.575097 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.575239 kubelet[2444]: W1213 01:49:35.575120 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.575239 kubelet[2444]: E1213 01:49:35.575137 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.575817 kubelet[2444]: E1213 01:49:35.575457 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.575817 kubelet[2444]: W1213 01:49:35.575470 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.575817 kubelet[2444]: E1213 01:49:35.575486 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.575817 kubelet[2444]: E1213 01:49:35.575691 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.575817 kubelet[2444]: W1213 01:49:35.575701 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.575817 kubelet[2444]: E1213 01:49:35.575714 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.576902 kubelet[2444]: E1213 01:49:35.576176 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.576902 kubelet[2444]: W1213 01:49:35.576191 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.576902 kubelet[2444]: E1213 01:49:35.576206 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.576902 kubelet[2444]: E1213 01:49:35.576401 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.576902 kubelet[2444]: W1213 01:49:35.576410 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.576902 kubelet[2444]: E1213 01:49:35.576423 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.576902 kubelet[2444]: E1213 01:49:35.576591 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.576902 kubelet[2444]: W1213 01:49:35.576600 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.576902 kubelet[2444]: E1213 01:49:35.576612 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.576902 kubelet[2444]: E1213 01:49:35.576786 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.577370 kubelet[2444]: W1213 01:49:35.576795 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.577370 kubelet[2444]: E1213 01:49:35.576807 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.577677 kubelet[2444]: E1213 01:49:35.577510 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.577677 kubelet[2444]: W1213 01:49:35.577524 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.577677 kubelet[2444]: E1213 01:49:35.577537 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.578020 kubelet[2444]: E1213 01:49:35.577870 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.578020 kubelet[2444]: W1213 01:49:35.577884 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.578020 kubelet[2444]: E1213 01:49:35.577898 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.578720 kubelet[2444]: E1213 01:49:35.578231 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.578720 kubelet[2444]: W1213 01:49:35.578245 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.578720 kubelet[2444]: E1213 01:49:35.578258 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.578720 kubelet[2444]: E1213 01:49:35.578454 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.578720 kubelet[2444]: W1213 01:49:35.578464 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.578720 kubelet[2444]: E1213 01:49:35.578477 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.579195 kubelet[2444]: E1213 01:49:35.579073 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.579195 kubelet[2444]: W1213 01:49:35.579088 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.579195 kubelet[2444]: E1213 01:49:35.579106 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.580845 kubelet[2444]: E1213 01:49:35.580739 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.580845 kubelet[2444]: W1213 01:49:35.580752 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.580845 kubelet[2444]: E1213 01:49:35.580763 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.582360 kubelet[2444]: E1213 01:49:35.582173 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.582360 kubelet[2444]: W1213 01:49:35.582188 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.582360 kubelet[2444]: E1213 01:49:35.582203 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.583074 kubelet[2444]: E1213 01:49:35.583058 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.583191 kubelet[2444]: W1213 01:49:35.583176 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.583283 kubelet[2444]: E1213 01:49:35.583269 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.583621 kubelet[2444]: E1213 01:49:35.583606 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.583737 kubelet[2444]: W1213 01:49:35.583722 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.583829 kubelet[2444]: E1213 01:49:35.583816 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.584862 kubelet[2444]: E1213 01:49:35.584846 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.584974 kubelet[2444]: W1213 01:49:35.584961 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.585064 kubelet[2444]: E1213 01:49:35.585051 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.585355 kubelet[2444]: E1213 01:49:35.585341 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.585457 kubelet[2444]: W1213 01:49:35.585441 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.585546 kubelet[2444]: E1213 01:49:35.585532 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.585859 kubelet[2444]: E1213 01:49:35.585844 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.585993 kubelet[2444]: W1213 01:49:35.585968 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.586081 kubelet[2444]: E1213 01:49:35.585995 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.586348 kubelet[2444]: E1213 01:49:35.586329 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.586348 kubelet[2444]: W1213 01:49:35.586345 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.586485 kubelet[2444]: E1213 01:49:35.586363 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.587024 kubelet[2444]: E1213 01:49:35.587004 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.587024 kubelet[2444]: W1213 01:49:35.587022 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.587206 kubelet[2444]: E1213 01:49:35.587191 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.587303 kubelet[2444]: E1213 01:49:35.587221 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.587367 kubelet[2444]: W1213 01:49:35.587317 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.587462 kubelet[2444]: E1213 01:49:35.587447 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.587538 kubelet[2444]: E1213 01:49:35.587500 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.587607 kubelet[2444]: W1213 01:49:35.587595 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.587704 kubelet[2444]: E1213 01:49:35.587685 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.588441 kubelet[2444]: E1213 01:49:35.588426 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.588546 kubelet[2444]: W1213 01:49:35.588531 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.588732 kubelet[2444]: E1213 01:49:35.588716 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.589551 kubelet[2444]: E1213 01:49:35.588885 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.589551 kubelet[2444]: W1213 01:49:35.588893 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.589551 kubelet[2444]: E1213 01:49:35.588990 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.589551 kubelet[2444]: E1213 01:49:35.589214 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.589551 kubelet[2444]: W1213 01:49:35.589226 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.589551 kubelet[2444]: E1213 01:49:35.589306 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.589551 kubelet[2444]: E1213 01:49:35.589450 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.589551 kubelet[2444]: W1213 01:49:35.589461 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.590069 kubelet[2444]: E1213 01:49:35.590053 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.590327 kubelet[2444]: E1213 01:49:35.590315 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.590428 kubelet[2444]: W1213 01:49:35.590414 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.590589 kubelet[2444]: E1213 01:49:35.590573 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.590812 kubelet[2444]: E1213 01:49:35.590799 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.590903 kubelet[2444]: W1213 01:49:35.590889 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.591140 kubelet[2444]: E1213 01:49:35.591125 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.591367 kubelet[2444]: E1213 01:49:35.591354 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.591505 kubelet[2444]: W1213 01:49:35.591489 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.591672 kubelet[2444]: E1213 01:49:35.591657 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.591900 kubelet[2444]: E1213 01:49:35.591886 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.592019 kubelet[2444]: W1213 01:49:35.592002 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.592176 kubelet[2444]: E1213 01:49:35.592163 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.592402 kubelet[2444]: E1213 01:49:35.592388 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.592504 kubelet[2444]: W1213 01:49:35.592489 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.592683 kubelet[2444]: E1213 01:49:35.592670 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.592897 kubelet[2444]: E1213 01:49:35.592885 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.595029 kubelet[2444]: W1213 01:49:35.595012 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.595200 kubelet[2444]: E1213 01:49:35.595184 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.595448 kubelet[2444]: E1213 01:49:35.595435 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.595543 kubelet[2444]: W1213 01:49:35.595531 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.595697 kubelet[2444]: E1213 01:49:35.595683 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.595952 kubelet[2444]: E1213 01:49:35.595903 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.596059 kubelet[2444]: W1213 01:49:35.596044 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.596246 kubelet[2444]: E1213 01:49:35.596230 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.596549 kubelet[2444]: E1213 01:49:35.596534 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.596669 kubelet[2444]: W1213 01:49:35.596653 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.596801 kubelet[2444]: E1213 01:49:35.596787 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.597114 kubelet[2444]: E1213 01:49:35.597091 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.597211 kubelet[2444]: W1213 01:49:35.597197 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.597307 kubelet[2444]: E1213 01:49:35.597294 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.597617 kubelet[2444]: E1213 01:49:35.597601 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.597757 kubelet[2444]: W1213 01:49:35.597741 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.597853 kubelet[2444]: E1213 01:49:35.597839 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.598187 kubelet[2444]: E1213 01:49:35.598173 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.598301 kubelet[2444]: W1213 01:49:35.598287 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.598382 kubelet[2444]: E1213 01:49:35.598370 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.600000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.600000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.601000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.601000 audit: BPF prog-id=122 op=LOAD Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=2826 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386630656535653934626164386130306430306434363263666537 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=2826 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386630656535653934626164386130306430306434363263666537 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit: BPF prog-id=123 op=LOAD Dec 13 01:49:35.602000 audit[2838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000243730 items=0 ppid=2826 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386630656535653934626164386130306430306434363263666537 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit: BPF prog-id=124 op=LOAD Dec 13 01:49:35.602000 audit[2838]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000243778 items=0 ppid=2826 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386630656535653934626164386130306430306434363263666537 Dec 13 01:49:35.602000 audit: BPF prog-id=124 op=UNLOAD Dec 13 01:49:35.602000 audit: BPF prog-id=123 op=UNLOAD Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { perfmon } for pid=2838 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit[2838]: AVC avc: denied { bpf } for pid=2838 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.602000 audit: BPF prog-id=125 op=LOAD Dec 13 01:49:35.602000 audit[2838]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c000243b88 items=0 ppid=2826 pid=2838 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.602000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3339386630656535653934626164386130306430306434363263666537 Dec 13 01:49:35.614164 kubelet[2444]: E1213 01:49:35.614127 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:35.614164 kubelet[2444]: W1213 01:49:35.614148 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:35.614314 kubelet[2444]: E1213 01:49:35.614167 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:35.616112 env[1412]: time="2024-12-13T01:49:35.616039386Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:49:35.616610 env[1412]: time="2024-12-13T01:49:35.616558830Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:49:35.616689 env[1412]: time="2024-12-13T01:49:35.616619136Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:49:35.616825 env[1412]: time="2024-12-13T01:49:35.616785250Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/725a0d9ce9ee81a6b662a648a9d7028aee0ca6e21dcc1da216fb8a0b25a408f4 pid=2901 runtime=io.containerd.runc.v2 Dec 13 01:49:35.638567 systemd[1]: Started cri-containerd-725a0d9ce9ee81a6b662a648a9d7028aee0ca6e21dcc1da216fb8a0b25a408f4.scope. Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.676000 audit: BPF prog-id=126 op=LOAD Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2901 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356130643963653965653831613662363632613634386139643730 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=2901 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356130643963653965653831613662363632613634386139643730 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.677000 audit: BPF prog-id=127 op=LOAD Dec 13 01:49:35.677000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002c9ce0 items=0 ppid=2901 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.677000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356130643963653965653831613662363632613634386139643730 Dec 13 01:49:35.678000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.678000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.678000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.678000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.678000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.678000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.678000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.678000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.678000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.678000 audit: BPF prog-id=128 op=LOAD Dec 13 01:49:35.678000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002c9d28 items=0 ppid=2901 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.678000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356130643963653965653831613662363632613634386139643730 Dec 13 01:49:35.679000 audit: BPF prog-id=128 op=UNLOAD Dec 13 01:49:35.679000 audit: BPF prog-id=127 op=UNLOAD Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { perfmon } for pid=2913 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit[2913]: AVC avc: denied { bpf } for pid=2913 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:35.679000 audit: BPF prog-id=129 op=LOAD Dec 13 01:49:35.679000 audit[2913]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000332138 items=0 ppid=2901 pid=2913 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:35.679000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3732356130643963653965653831613662363632613634386139643730 Dec 13 01:49:35.684088 env[1412]: time="2024-12-13T01:49:35.683894011Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-typha-7885bd88cb-tct2l,Uid:025fc5f7-7bb5-4c4c-a9da-39653ecf3325,Namespace:calico-system,Attempt:0,} returns sandbox id \"398f0ee5e94bad8a00d00d462cfe7b450178010ad9e36eb5c16476cbb6a0d1c6\"" Dec 13 01:49:35.686684 env[1412]: time="2024-12-13T01:49:35.686653948Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\"" Dec 13 01:49:35.701983 env[1412]: time="2024-12-13T01:49:35.701948261Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-node-vtqch,Uid:b9a93461-0427-47b2-bbf6-5a6c8cc93619,Namespace:calico-system,Attempt:0,} returns sandbox id \"725a0d9ce9ee81a6b662a648a9d7028aee0ca6e21dcc1da216fb8a0b25a408f4\"" Dec 13 01:49:36.135000 audit[2944]: NETFILTER_CFG table=filter:97 family=2 entries=17 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:36.135000 audit[2944]: SYSCALL arch=c000003e syscall=46 success=yes exit=6736 a0=3 a1=7ffc2f67dca0 a2=0 a3=7ffc2f67dc8c items=0 ppid=2621 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.135000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:36.138000 audit[2944]: NETFILTER_CFG table=nat:98 family=2 entries=12 op=nft_register_rule pid=2944 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:36.138000 audit[2944]: SYSCALL arch=c000003e syscall=46 success=yes exit=2700 a0=3 a1=7ffc2f67dca0 a2=0 a3=0 items=0 ppid=2621 pid=2944 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:36.138000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:36.883430 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount4260626992.mount: Deactivated successfully. Dec 13 01:49:37.484055 kubelet[2444]: E1213 01:49:37.484002 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t2mmp" podUID="dee8dd51-2759-489b-acfd-de00febc629a" Dec 13 01:49:37.780412 env[1412]: time="2024-12-13T01:49:37.780273879Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:37.785037 env[1412]: time="2024-12-13T01:49:37.784996370Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:37.796842 env[1412]: time="2024-12-13T01:49:37.796762244Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/typha:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:37.800532 env[1412]: time="2024-12-13T01:49:37.800445948Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/typha@sha256:768a194e1115c73bcbf35edb7afd18a63e16e08d940c79993565b6a3cca2da7c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:37.801321 env[1412]: time="2024-12-13T01:49:37.801286718Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/typha:v3.29.1\" returns image reference \"sha256:4cb3738506f5a9c530033d1e24fd6b9ec618518a2ec8b012ded33572be06ab44\"" Dec 13 01:49:37.805145 env[1412]: time="2024-12-13T01:49:37.805117135Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\"" Dec 13 01:49:37.819608 env[1412]: time="2024-12-13T01:49:37.819576331Z" level=info msg="CreateContainer within sandbox \"398f0ee5e94bad8a00d00d462cfe7b450178010ad9e36eb5c16476cbb6a0d1c6\" for container &ContainerMetadata{Name:calico-typha,Attempt:0,}" Dec 13 01:49:37.847478 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3059624526.mount: Deactivated successfully. Dec 13 01:49:37.863661 env[1412]: time="2024-12-13T01:49:37.863611474Z" level=info msg="CreateContainer within sandbox \"398f0ee5e94bad8a00d00d462cfe7b450178010ad9e36eb5c16476cbb6a0d1c6\" for &ContainerMetadata{Name:calico-typha,Attempt:0,} returns container id \"4b8b494299f8bb144cb0af700a282725530c584b6b93c89afa52c961d9ec543e\"" Dec 13 01:49:37.864511 env[1412]: time="2024-12-13T01:49:37.864477546Z" level=info msg="StartContainer for \"4b8b494299f8bb144cb0af700a282725530c584b6b93c89afa52c961d9ec543e\"" Dec 13 01:49:37.890945 systemd[1]: Started cri-containerd-4b8b494299f8bb144cb0af700a282725530c584b6b93c89afa52c961d9ec543e.scope. Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit: BPF prog-id=130 op=LOAD Dec 13 01:49:37.909000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=2826 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386234393432393966386262313434636230616637303061323832 Dec 13 01:49:37.909000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.909000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=2826 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.909000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386234393432393966386262313434636230616637303061323832 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit: BPF prog-id=131 op=LOAD Dec 13 01:49:37.910000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002f3dc0 items=0 ppid=2826 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386234393432393966386262313434636230616637303061323832 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit: BPF prog-id=132 op=LOAD Dec 13 01:49:37.910000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002f3e08 items=0 ppid=2826 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386234393432393966386262313434636230616637303061323832 Dec 13 01:49:37.910000 audit: BPF prog-id=132 op=UNLOAD Dec 13 01:49:37.910000 audit: BPF prog-id=131 op=UNLOAD Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { perfmon } for pid=2954 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit[2954]: AVC avc: denied { bpf } for pid=2954 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:37.910000 audit: BPF prog-id=133 op=LOAD Dec 13 01:49:37.910000 audit[2954]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c0003de218 items=0 ppid=2826 pid=2954 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:37.910000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3462386234393432393966386262313434636230616637303061323832 Dec 13 01:49:37.945888 env[1412]: time="2024-12-13T01:49:37.945825476Z" level=info msg="StartContainer for \"4b8b494299f8bb144cb0af700a282725530c584b6b93c89afa52c961d9ec543e\" returns successfully" Dec 13 01:49:38.570268 kubelet[2444]: I1213 01:49:38.570199 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-typha-7885bd88cb-tct2l" podStartSLOduration=1.453289926 podStartE2EDuration="3.570178386s" podCreationTimestamp="2024-12-13 01:49:35 +0000 UTC" firstStartedPulling="2024-12-13 01:49:35.685454545 +0000 UTC m=+13.309493420" lastFinishedPulling="2024-12-13 01:49:37.802343005 +0000 UTC m=+15.426381880" observedRunningTime="2024-12-13 01:49:38.554997453 +0000 UTC m=+16.179036428" watchObservedRunningTime="2024-12-13 01:49:38.570178386 +0000 UTC m=+16.194217361" Dec 13 01:49:38.584000 audit[2986]: NETFILTER_CFG table=filter:99 family=2 entries=17 op=nft_register_rule pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:38.584000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffc3ec6b530 a2=0 a3=7ffc3ec6b51c items=0 ppid=2621 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:38.584000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:38.588000 audit[2986]: NETFILTER_CFG table=nat:100 family=2 entries=19 op=nft_register_chain pid=2986 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:49:38.588000 audit[2986]: SYSCALL arch=c000003e syscall=46 success=yes exit=6276 a0=3 a1=7ffc3ec6b530 a2=0 a3=7ffc3ec6b51c items=0 ppid=2621 pid=2986 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:38.588000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:49:38.611617 kubelet[2444]: E1213 01:49:38.611584 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.611617 kubelet[2444]: W1213 01:49:38.611611 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.612015 kubelet[2444]: E1213 01:49:38.611638 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.612096 kubelet[2444]: E1213 01:49:38.612064 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.612096 kubelet[2444]: W1213 01:49:38.612082 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.612235 kubelet[2444]: E1213 01:49:38.612101 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.612387 kubelet[2444]: E1213 01:49:38.612358 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.612387 kubelet[2444]: W1213 01:49:38.612374 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.612528 kubelet[2444]: E1213 01:49:38.612390 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.612701 kubelet[2444]: E1213 01:49:38.612680 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.612701 kubelet[2444]: W1213 01:49:38.612699 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.612867 kubelet[2444]: E1213 01:49:38.612716 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.613030 kubelet[2444]: E1213 01:49:38.613005 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.613030 kubelet[2444]: W1213 01:49:38.613023 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.613030 kubelet[2444]: E1213 01:49:38.613039 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.613353 kubelet[2444]: E1213 01:49:38.613334 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.613353 kubelet[2444]: W1213 01:49:38.613350 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.613511 kubelet[2444]: E1213 01:49:38.613366 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.613595 kubelet[2444]: E1213 01:49:38.613578 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.613675 kubelet[2444]: W1213 01:49:38.613596 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.613675 kubelet[2444]: E1213 01:49:38.613611 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.613931 kubelet[2444]: E1213 01:49:38.613890 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.614019 kubelet[2444]: W1213 01:49:38.613908 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.614019 kubelet[2444]: E1213 01:49:38.613950 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.614203 kubelet[2444]: E1213 01:49:38.614185 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.614203 kubelet[2444]: W1213 01:49:38.614200 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.614333 kubelet[2444]: E1213 01:49:38.614215 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.614512 kubelet[2444]: E1213 01:49:38.614492 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.614512 kubelet[2444]: W1213 01:49:38.614507 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.614662 kubelet[2444]: E1213 01:49:38.614522 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.614751 kubelet[2444]: E1213 01:49:38.614730 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.614751 kubelet[2444]: W1213 01:49:38.614747 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.614879 kubelet[2444]: E1213 01:49:38.614764 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.615095 kubelet[2444]: E1213 01:49:38.615077 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.615095 kubelet[2444]: W1213 01:49:38.615093 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.615222 kubelet[2444]: E1213 01:49:38.615108 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.615392 kubelet[2444]: E1213 01:49:38.615364 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.615392 kubelet[2444]: W1213 01:49:38.615379 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.615548 kubelet[2444]: E1213 01:49:38.615395 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.615631 kubelet[2444]: E1213 01:49:38.615614 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.615705 kubelet[2444]: W1213 01:49:38.615632 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.615705 kubelet[2444]: E1213 01:49:38.615647 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.615874 kubelet[2444]: E1213 01:49:38.615853 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.615874 kubelet[2444]: W1213 01:49:38.615868 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.616176 kubelet[2444]: E1213 01:49:38.615883 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.618265 kubelet[2444]: E1213 01:49:38.618245 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.618265 kubelet[2444]: W1213 01:49:38.618261 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.618425 kubelet[2444]: E1213 01:49:38.618278 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.618736 kubelet[2444]: E1213 01:49:38.618686 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.618736 kubelet[2444]: W1213 01:49:38.618733 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.619259 kubelet[2444]: E1213 01:49:38.618757 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.619343 kubelet[2444]: E1213 01:49:38.619319 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.619410 kubelet[2444]: W1213 01:49:38.619345 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.619410 kubelet[2444]: E1213 01:49:38.619365 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.619697 kubelet[2444]: E1213 01:49:38.619679 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.619697 kubelet[2444]: W1213 01:49:38.619697 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.619855 kubelet[2444]: E1213 01:49:38.619718 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.619977 kubelet[2444]: E1213 01:49:38.619956 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.619977 kubelet[2444]: W1213 01:49:38.619973 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.620153 kubelet[2444]: E1213 01:49:38.620131 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.620238 kubelet[2444]: E1213 01:49:38.620175 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.620324 kubelet[2444]: W1213 01:49:38.620297 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.620453 kubelet[2444]: E1213 01:49:38.620435 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.620542 kubelet[2444]: E1213 01:49:38.620524 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.620606 kubelet[2444]: W1213 01:49:38.620543 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.620606 kubelet[2444]: E1213 01:49:38.620558 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.620824 kubelet[2444]: E1213 01:49:38.620810 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.620824 kubelet[2444]: W1213 01:49:38.620821 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.620992 kubelet[2444]: E1213 01:49:38.620838 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.621076 kubelet[2444]: E1213 01:49:38.621059 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.621076 kubelet[2444]: W1213 01:49:38.621072 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.621173 kubelet[2444]: E1213 01:49:38.621089 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.621323 kubelet[2444]: E1213 01:49:38.621307 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.621323 kubelet[2444]: W1213 01:49:38.621320 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.621477 kubelet[2444]: E1213 01:49:38.621461 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.621612 kubelet[2444]: E1213 01:49:38.621482 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.621671 kubelet[2444]: W1213 01:49:38.621614 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.621796 kubelet[2444]: E1213 01:49:38.621781 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.621852 kubelet[2444]: W1213 01:49:38.621796 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.621852 kubelet[2444]: E1213 01:49:38.621809 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.622072 kubelet[2444]: E1213 01:49:38.622054 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.622072 kubelet[2444]: W1213 01:49:38.622067 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.622185 kubelet[2444]: E1213 01:49:38.622080 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.622254 kubelet[2444]: E1213 01:49:38.622237 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.622399 kubelet[2444]: E1213 01:49:38.622384 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.622399 kubelet[2444]: W1213 01:49:38.622396 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.622548 kubelet[2444]: E1213 01:49:38.622414 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.622988 kubelet[2444]: E1213 01:49:38.622971 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.622988 kubelet[2444]: W1213 01:49:38.622984 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.623123 kubelet[2444]: E1213 01:49:38.623002 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.623211 kubelet[2444]: E1213 01:49:38.623198 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.623211 kubelet[2444]: W1213 01:49:38.623209 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.623309 kubelet[2444]: E1213 01:49:38.623227 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.623441 kubelet[2444]: E1213 01:49:38.623428 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.623441 kubelet[2444]: W1213 01:49:38.623439 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.623527 kubelet[2444]: E1213 01:49:38.623452 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:38.623799 kubelet[2444]: E1213 01:49:38.623784 2444 driver-call.go:262] Failed to unmarshal output for command: init, output: "", error: unexpected end of JSON input Dec 13 01:49:38.623799 kubelet[2444]: W1213 01:49:38.623796 2444 driver-call.go:149] FlexVolume: driver call failed: executable: /opt/libexec/kubernetes/kubelet-plugins/volume/exec/nodeagent~uds/uds, args: [init], error: executable file not found in $PATH, output: "" Dec 13 01:49:38.623887 kubelet[2444]: E1213 01:49:38.623809 2444 plugins.go:691] "Error dynamically probing plugins" err="error creating Flexvolume plugin from directory nodeagent~uds, skipping. Error: unexpected end of JSON input" Dec 13 01:49:39.074886 env[1412]: time="2024-12-13T01:49:39.074844383Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:39.081450 env[1412]: time="2024-12-13T01:49:39.081412407Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:39.086509 env[1412]: time="2024-12-13T01:49:39.086465211Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:39.090803 env[1412]: time="2024-12-13T01:49:39.090774455Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/pod2daemon-flexvol@sha256:a63f8b4ff531912d12d143664eb263fdbc6cd7b3ff4aa777dfb6e318a090462c,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:39.091625 env[1412]: time="2024-12-13T01:49:39.091584819Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/pod2daemon-flexvol:v3.29.1\" returns image reference \"sha256:2b7452b763ec8833ca0386ada5fd066e552a9b3b02b8538a5e34cc3d6d3840a6\"" Dec 13 01:49:39.094616 env[1412]: time="2024-12-13T01:49:39.094574858Z" level=info msg="CreateContainer within sandbox \"725a0d9ce9ee81a6b662a648a9d7028aee0ca6e21dcc1da216fb8a0b25a408f4\" for container &ContainerMetadata{Name:flexvol-driver,Attempt:0,}" Dec 13 01:49:39.136261 env[1412]: time="2024-12-13T01:49:39.136207481Z" level=info msg="CreateContainer within sandbox \"725a0d9ce9ee81a6b662a648a9d7028aee0ca6e21dcc1da216fb8a0b25a408f4\" for &ContainerMetadata{Name:flexvol-driver,Attempt:0,} returns container id \"be0453a0c4626d32a12370e3a715f76fa286dab16b594d05ddc4c91e40ff2d20\"" Dec 13 01:49:39.136973 env[1412]: time="2024-12-13T01:49:39.136900236Z" level=info msg="StartContainer for \"be0453a0c4626d32a12370e3a715f76fa286dab16b594d05ddc4c91e40ff2d20\"" Dec 13 01:49:39.171009 systemd[1]: Started cri-containerd-be0453a0c4626d32a12370e3a715f76fa286dab16b594d05ddc4c91e40ff2d20.scope. Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=7fb231046e78 items=0 ppid=2901 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265303435336130633436323664333261313233373065336137313566 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit: BPF prog-id=134 op=LOAD Dec 13 01:49:39.213000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c00026fc58 items=0 ppid=2901 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265303435336130633436323664333261313233373065336137313566 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.213000 audit: BPF prog-id=135 op=LOAD Dec 13 01:49:39.213000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c00026fca8 items=0 ppid=2901 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.213000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265303435336130633436323664333261313233373065336137313566 Dec 13 01:49:39.214000 audit: BPF prog-id=135 op=UNLOAD Dec 13 01:49:39.214000 audit: BPF prog-id=134 op=UNLOAD Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { perfmon } for pid=3025 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit[3025]: AVC avc: denied { bpf } for pid=3025 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:39.214000 audit: BPF prog-id=136 op=LOAD Dec 13 01:49:39.214000 audit[3025]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c00026fd38 items=0 ppid=2901 pid=3025 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:39.214000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6265303435336130633436323664333261313233373065336137313566 Dec 13 01:49:39.235615 env[1412]: time="2024-12-13T01:49:39.235558610Z" level=info msg="StartContainer for \"be0453a0c4626d32a12370e3a715f76fa286dab16b594d05ddc4c91e40ff2d20\" returns successfully" Dec 13 01:49:39.246483 systemd[1]: cri-containerd-be0453a0c4626d32a12370e3a715f76fa286dab16b594d05ddc4c91e40ff2d20.scope: Deactivated successfully. Dec 13 01:49:39.249000 audit: BPF prog-id=136 op=UNLOAD Dec 13 01:49:39.483346 kubelet[2444]: E1213 01:49:39.483307 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t2mmp" podUID="dee8dd51-2759-489b-acfd-de00febc629a" Dec 13 01:49:39.809358 systemd[1]: run-containerd-runc-k8s.io-be0453a0c4626d32a12370e3a715f76fa286dab16b594d05ddc4c91e40ff2d20-runc.BKmF2v.mount: Deactivated successfully. Dec 13 01:49:39.809475 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-be0453a0c4626d32a12370e3a715f76fa286dab16b594d05ddc4c91e40ff2d20-rootfs.mount: Deactivated successfully. Dec 13 01:49:41.483617 kubelet[2444]: E1213 01:49:41.483555 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t2mmp" podUID="dee8dd51-2759-489b-acfd-de00febc629a" Dec 13 01:49:41.739475 env[1412]: time="2024-12-13T01:49:41.739083201Z" level=info msg="shim disconnected" id=be0453a0c4626d32a12370e3a715f76fa286dab16b594d05ddc4c91e40ff2d20 Dec 13 01:49:41.739475 env[1412]: time="2024-12-13T01:49:41.739139405Z" level=warning msg="cleaning up after shim disconnected" id=be0453a0c4626d32a12370e3a715f76fa286dab16b594d05ddc4c91e40ff2d20 namespace=k8s.io Dec 13 01:49:41.739475 env[1412]: time="2024-12-13T01:49:41.739150906Z" level=info msg="cleaning up dead shim" Dec 13 01:49:41.747340 env[1412]: time="2024-12-13T01:49:41.747301434Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:41Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3071 runtime=io.containerd.runc.v2\n" Dec 13 01:49:42.547645 env[1412]: time="2024-12-13T01:49:42.547594494Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\"" Dec 13 01:49:43.484050 kubelet[2444]: E1213 01:49:43.483988 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t2mmp" podUID="dee8dd51-2759-489b-acfd-de00febc629a" Dec 13 01:49:45.484032 kubelet[2444]: E1213 01:49:45.483971 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t2mmp" podUID="dee8dd51-2759-489b-acfd-de00febc629a" Dec 13 01:49:46.897153 env[1412]: time="2024-12-13T01:49:46.897051301Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:46.903241 env[1412]: time="2024-12-13T01:49:46.903207337Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:46.906153 env[1412]: time="2024-12-13T01:49:46.906072441Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/cni:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:46.910060 env[1412]: time="2024-12-13T01:49:46.910010320Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/cni@sha256:21e759d51c90dfb34fc1397dc180dd3a3fb564c2b0580d2f61ffe108f2a3c94b,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:46.910573 env[1412]: time="2024-12-13T01:49:46.910541658Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/cni:v3.29.1\" returns image reference \"sha256:7dd6ea186aba0d7a1791a79d426fe854527ca95192b26bbd19e8baf8373f7d0e\"" Dec 13 01:49:46.913752 env[1412]: time="2024-12-13T01:49:46.913721483Z" level=info msg="CreateContainer within sandbox \"725a0d9ce9ee81a6b662a648a9d7028aee0ca6e21dcc1da216fb8a0b25a408f4\" for container &ContainerMetadata{Name:install-cni,Attempt:0,}" Dec 13 01:49:46.955685 env[1412]: time="2024-12-13T01:49:46.955637456Z" level=info msg="CreateContainer within sandbox \"725a0d9ce9ee81a6b662a648a9d7028aee0ca6e21dcc1da216fb8a0b25a408f4\" for &ContainerMetadata{Name:install-cni,Attempt:0,} returns container id \"a2b1a62a6ce220b1989e59e4f8a743314727dd732ce63d3be111dcea9554ff1e\"" Dec 13 01:49:46.957491 env[1412]: time="2024-12-13T01:49:46.956269500Z" level=info msg="StartContainer for \"a2b1a62a6ce220b1989e59e4f8a743314727dd732ce63d3be111dcea9554ff1e\"" Dec 13 01:49:46.989110 systemd[1]: run-containerd-runc-k8s.io-a2b1a62a6ce220b1989e59e4f8a743314727dd732ce63d3be111dcea9554ff1e-runc.PQ0Gxv.mount: Deactivated successfully. Dec 13 01:49:46.993985 systemd[1]: Started cri-containerd-a2b1a62a6ce220b1989e59e4f8a743314727dd732ce63d3be111dcea9554ff1e.scope. Dec 13 01:49:47.025892 kernel: kauditd_printk_skb: 229 callbacks suppressed Dec 13 01:49:47.026028 kernel: audit: type=1400 audit(1734054587.006:1020): avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f3c9de72b98 items=0 ppid=2901 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:47.047927 kernel: audit: type=1300 audit(1734054587.006:1020): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001476b0 a2=3c a3=7f3c9de72b98 items=0 ppid=2901 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:47.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623161363261366365323230623139383965353965346638613734 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.083872 kernel: audit: type=1327 audit(1734054587.006:1020): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623161363261366365323230623139383965353965346638613734 Dec 13 01:49:47.083957 kernel: audit: type=1400 audit(1734054587.006:1021): avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.083985 kernel: audit: type=1400 audit(1734054587.006:1021): avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.099235 env[1412]: time="2024-12-13T01:49:47.099200327Z" level=info msg="StartContainer for \"a2b1a62a6ce220b1989e59e4f8a743314727dd732ce63d3be111dcea9554ff1e\" returns successfully" Dec 13 01:49:47.108439 kernel: audit: type=1400 audit(1734054587.006:1021): avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.139084 kernel: audit: type=1400 audit(1734054587.006:1021): avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.139166 kernel: audit: type=1400 audit(1734054587.006:1021): avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.168811 kernel: audit: type=1400 audit(1734054587.006:1021): avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.168893 kernel: audit: type=1400 audit(1734054587.006:1021): avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.006000 audit: BPF prog-id=137 op=LOAD Dec 13 01:49:47.006000 audit[3092]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001479d8 a2=78 a3=c0001b8d78 items=0 ppid=2901 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:47.006000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623161363261366365323230623139383965353965346638613734 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit: BPF prog-id=138 op=LOAD Dec 13 01:49:47.025000 audit[3092]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000147770 a2=78 a3=c0001b8dc8 items=0 ppid=2901 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:47.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623161363261366365323230623139383965353965346638613734 Dec 13 01:49:47.025000 audit: BPF prog-id=138 op=UNLOAD Dec 13 01:49:47.025000 audit: BPF prog-id=137 op=UNLOAD Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { perfmon } for pid=3092 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit[3092]: AVC avc: denied { bpf } for pid=3092 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:47.025000 audit: BPF prog-id=139 op=LOAD Dec 13 01:49:47.025000 audit[3092]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000147c30 a2=78 a3=c0001b8e58 items=0 ppid=2901 pid=3092 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:47.025000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6132623161363261366365323230623139383965353965346638613734 Dec 13 01:49:47.483857 kubelet[2444]: E1213 01:49:47.483715 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="network is not ready: container runtime network not ready: NetworkReady=false reason:NetworkPluginNotReady message:Network plugin returns error: cni plugin not initialized" pod="calico-system/csi-node-driver-t2mmp" podUID="dee8dd51-2759-489b-acfd-de00febc629a" Dec 13 01:49:48.498870 env[1412]: time="2024-12-13T01:49:48.498804179Z" level=error msg="failed to reload cni configuration after receiving fs change event(\"/etc/cni/net.d/calico-kubeconfig\": WRITE)" error="cni config load failed: no network config found in /etc/cni/net.d: cni plugin not initialized: failed to load cni config" Dec 13 01:49:48.501606 systemd[1]: cri-containerd-a2b1a62a6ce220b1989e59e4f8a743314727dd732ce63d3be111dcea9554ff1e.scope: Deactivated successfully. Dec 13 01:49:48.506000 audit: BPF prog-id=139 op=UNLOAD Dec 13 01:49:48.526726 systemd[1]: run-containerd-io.containerd.runtime.v2.task-k8s.io-a2b1a62a6ce220b1989e59e4f8a743314727dd732ce63d3be111dcea9554ff1e-rootfs.mount: Deactivated successfully. Dec 13 01:49:48.595622 kubelet[2444]: I1213 01:49:48.595592 2444 kubelet_node_status.go:488] "Fast updating node status as it just became ready" Dec 13 01:49:49.075897 kubelet[2444]: W1213 01:49:48.642545 2444 reflector.go:561] object-"calico-apiserver"/"calico-apiserver-certs": failed to list *v1.Secret: secrets "calico-apiserver-certs" is forbidden: User "system:node:ci-3510.3.6-a-92bad84337" cannot list resource "secrets" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.6-a-92bad84337' and this object Dec 13 01:49:49.075897 kubelet[2444]: E1213 01:49:48.642603 2444 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"calico-apiserver-certs\": Failed to watch *v1.Secret: failed to list *v1.Secret: secrets \"calico-apiserver-certs\" is forbidden: User \"system:node:ci-3510.3.6-a-92bad84337\" cannot list resource \"secrets\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'ci-3510.3.6-a-92bad84337' and this object" logger="UnhandledError" Dec 13 01:49:49.075897 kubelet[2444]: W1213 01:49:48.642714 2444 reflector.go:561] object-"calico-apiserver"/"kube-root-ca.crt": failed to list *v1.ConfigMap: configmaps "kube-root-ca.crt" is forbidden: User "system:node:ci-3510.3.6-a-92bad84337" cannot list resource "configmaps" in API group "" in the namespace "calico-apiserver": no relationship found between node 'ci-3510.3.6-a-92bad84337' and this object Dec 13 01:49:49.075897 kubelet[2444]: E1213 01:49:48.642741 2444 reflector.go:158] "Unhandled Error" err="object-\"calico-apiserver\"/\"kube-root-ca.crt\": Failed to watch *v1.ConfigMap: failed to list *v1.ConfigMap: configmaps \"kube-root-ca.crt\" is forbidden: User \"system:node:ci-3510.3.6-a-92bad84337\" cannot list resource \"configmaps\" in API group \"\" in the namespace \"calico-apiserver\": no relationship found between node 'ci-3510.3.6-a-92bad84337' and this object" logger="UnhandledError" Dec 13 01:49:48.629696 systemd[1]: Created slice kubepods-burstable-pod739d2c4b_57e6_401b_93fa_cecc2c721ae5.slice. Dec 13 01:49:49.076366 kubelet[2444]: I1213 01:49:48.694694 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-bbvkq\" (UniqueName: \"kubernetes.io/projected/9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4-kube-api-access-bbvkq\") pod \"coredns-6f6b679f8f-chq67\" (UID: \"9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4\") " pod="kube-system/coredns-6f6b679f8f-chq67" Dec 13 01:49:49.076366 kubelet[2444]: I1213 01:49:48.694784 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-lc5wb\" (UniqueName: \"kubernetes.io/projected/db6522ed-ade8-4bda-84b5-172c7548fe69-kube-api-access-lc5wb\") pod \"calico-apiserver-c87d4d589-v7pqw\" (UID: \"db6522ed-ade8-4bda-84b5-172c7548fe69\") " pod="calico-apiserver/calico-apiserver-c87d4d589-v7pqw" Dec 13 01:49:49.076366 kubelet[2444]: I1213 01:49:48.694852 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"tigera-ca-bundle\" (UniqueName: \"kubernetes.io/configmap/3b2e20c2-5f0a-4735-afcc-b2f438a0615b-tigera-ca-bundle\") pod \"calico-kube-controllers-955cfb777-kkbj7\" (UID: \"3b2e20c2-5f0a-4735-afcc-b2f438a0615b\") " pod="calico-system/calico-kube-controllers-955cfb777-kkbj7" Dec 13 01:49:49.076366 kubelet[2444]: I1213 01:49:48.694889 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4-config-volume\") pod \"coredns-6f6b679f8f-chq67\" (UID: \"9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4\") " pod="kube-system/coredns-6f6b679f8f-chq67" Dec 13 01:49:49.076366 kubelet[2444]: I1213 01:49:48.694935 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-hw8jd\" (UniqueName: \"kubernetes.io/projected/3b2e20c2-5f0a-4735-afcc-b2f438a0615b-kube-api-access-hw8jd\") pod \"calico-kube-controllers-955cfb777-kkbj7\" (UID: \"3b2e20c2-5f0a-4735-afcc-b2f438a0615b\") " pod="calico-system/calico-kube-controllers-955cfb777-kkbj7" Dec 13 01:49:48.641924 systemd[1]: Created slice kubepods-burstable-pod9b953f4f_1d58_4af5_9cb0_4c8c76c4fbe4.slice. Dec 13 01:49:49.076695 kubelet[2444]: I1213 01:49:48.694959 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/db6522ed-ade8-4bda-84b5-172c7548fe69-calico-apiserver-certs\") pod \"calico-apiserver-c87d4d589-v7pqw\" (UID: \"db6522ed-ade8-4bda-84b5-172c7548fe69\") " pod="calico-apiserver/calico-apiserver-c87d4d589-v7pqw" Dec 13 01:49:49.076695 kubelet[2444]: I1213 01:49:48.694977 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"config-volume\" (UniqueName: \"kubernetes.io/configmap/739d2c4b-57e6-401b-93fa-cecc2c721ae5-config-volume\") pod \"coredns-6f6b679f8f-bncnx\" (UID: \"739d2c4b-57e6-401b-93fa-cecc2c721ae5\") " pod="kube-system/coredns-6f6b679f8f-bncnx" Dec 13 01:49:49.076695 kubelet[2444]: I1213 01:49:48.694991 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-p4w4m\" (UniqueName: \"kubernetes.io/projected/739d2c4b-57e6-401b-93fa-cecc2c721ae5-kube-api-access-p4w4m\") pod \"coredns-6f6b679f8f-bncnx\" (UID: \"739d2c4b-57e6-401b-93fa-cecc2c721ae5\") " pod="kube-system/coredns-6f6b679f8f-bncnx" Dec 13 01:49:49.076695 kubelet[2444]: I1213 01:49:48.695011 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"kube-api-access-xcqbj\" (UniqueName: \"kubernetes.io/projected/d3874a66-1fc2-4d94-8282-e2b409f57d2c-kube-api-access-xcqbj\") pod \"calico-apiserver-c87d4d589-x5jhp\" (UID: \"d3874a66-1fc2-4d94-8282-e2b409f57d2c\") " pod="calico-apiserver/calico-apiserver-c87d4d589-x5jhp" Dec 13 01:49:49.076695 kubelet[2444]: I1213 01:49:48.695035 2444 reconciler_common.go:245] "operationExecutor.VerifyControllerAttachedVolume started for volume \"calico-apiserver-certs\" (UniqueName: \"kubernetes.io/secret/d3874a66-1fc2-4d94-8282-e2b409f57d2c-calico-apiserver-certs\") pod \"calico-apiserver-c87d4d589-x5jhp\" (UID: \"d3874a66-1fc2-4d94-8282-e2b409f57d2c\") " pod="calico-apiserver/calico-apiserver-c87d4d589-x5jhp" Dec 13 01:49:48.649776 systemd[1]: Created slice kubepods-besteffort-podd3874a66_1fc2_4d94_8282_e2b409f57d2c.slice. Dec 13 01:49:48.656368 systemd[1]: Created slice kubepods-besteffort-pod3b2e20c2_5f0a_4735_afcc_b2f438a0615b.slice. Dec 13 01:49:48.662049 systemd[1]: Created slice kubepods-besteffort-poddb6522ed_ade8_4bda_84b5_172c7548fe69.slice. Dec 13 01:49:49.378772 env[1412]: time="2024-12-13T01:49:49.378621843Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-bncnx,Uid:739d2c4b-57e6-401b-93fa-cecc2c721ae5,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:49.385139 env[1412]: time="2024-12-13T01:49:49.385097982Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-955cfb777-kkbj7,Uid:3b2e20c2-5f0a-4735-afcc-b2f438a0615b,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:49.385454 env[1412]: time="2024-12-13T01:49:49.385422504Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-chq67,Uid:9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4,Namespace:kube-system,Attempt:0,}" Dec 13 01:49:49.488732 systemd[1]: Created slice kubepods-besteffort-poddee8dd51_2759_489b_acfd_de00febc629a.slice. Dec 13 01:49:49.491647 env[1412]: time="2024-12-13T01:49:49.491603689Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t2mmp,Uid:dee8dd51-2759-489b-acfd-de00febc629a,Namespace:calico-system,Attempt:0,}" Dec 13 01:49:49.685763 env[1412]: time="2024-12-13T01:49:49.685714624Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c87d4d589-v7pqw,Uid:db6522ed-ade8-4bda-84b5-172c7548fe69,Namespace:calico-apiserver,Attempt:0,}" Dec 13 01:49:49.696953 env[1412]: time="2024-12-13T01:49:49.696902881Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c87d4d589-x5jhp,Uid:d3874a66-1fc2-4d94-8282-e2b409f57d2c,Namespace:calico-apiserver,Attempt:0,}" Dec 13 01:49:50.190960 env[1412]: time="2024-12-13T01:49:50.190896616Z" level=info msg="shim disconnected" id=a2b1a62a6ce220b1989e59e4f8a743314727dd732ce63d3be111dcea9554ff1e Dec 13 01:49:50.190960 env[1412]: time="2024-12-13T01:49:50.190958020Z" level=warning msg="cleaning up after shim disconnected" id=a2b1a62a6ce220b1989e59e4f8a743314727dd732ce63d3be111dcea9554ff1e namespace=k8s.io Dec 13 01:49:50.190960 env[1412]: time="2024-12-13T01:49:50.190970321Z" level=info msg="cleaning up dead shim" Dec 13 01:49:50.199245 env[1412]: time="2024-12-13T01:49:50.199207270Z" level=warning msg="cleanup warnings time=\"2024-12-13T01:49:50Z\" level=info msg=\"starting signal loop\" namespace=k8s.io pid=3148 runtime=io.containerd.runc.v2\n" Dec 13 01:49:50.521135 env[1412]: time="2024-12-13T01:49:50.520746602Z" level=error msg="Failed to destroy network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.521379 env[1412]: time="2024-12-13T01:49:50.521333441Z" level=error msg="encountered an error cleaning up failed sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.521463 env[1412]: time="2024-12-13T01:49:50.521407546Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-bncnx,Uid:739d2c4b-57e6-401b-93fa-cecc2c721ae5,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.521699 kubelet[2444]: E1213 01:49:50.521648 2444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.522096 kubelet[2444]: E1213 01:49:50.521740 2444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-bncnx" Dec 13 01:49:50.522096 kubelet[2444]: E1213 01:49:50.521768 2444 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-bncnx" Dec 13 01:49:50.524482 kubelet[2444]: E1213 01:49:50.524434 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-bncnx_kube-system(739d2c4b-57e6-401b-93fa-cecc2c721ae5)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-bncnx_kube-system(739d2c4b-57e6-401b-93fa-cecc2c721ae5)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-bncnx" podUID="739d2c4b-57e6-401b-93fa-cecc2c721ae5" Dec 13 01:49:50.597441 env[1412]: time="2024-12-13T01:49:50.597398611Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\"" Dec 13 01:49:50.600025 env[1412]: time="2024-12-13T01:49:50.599973783Z" level=error msg="Failed to destroy network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.600537 env[1412]: time="2024-12-13T01:49:50.600494817Z" level=error msg="encountered an error cleaning up failed sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.600712 env[1412]: time="2024-12-13T01:49:50.600680130Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c87d4d589-v7pqw,Uid:db6522ed-ade8-4bda-84b5-172c7548fe69,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.603348 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1-shm.mount: Deactivated successfully. Dec 13 01:49:50.604677 kubelet[2444]: E1213 01:49:50.604641 2444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.604798 kubelet[2444]: E1213 01:49:50.604711 2444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c87d4d589-v7pqw" Dec 13 01:49:50.604798 kubelet[2444]: E1213 01:49:50.604738 2444 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c87d4d589-v7pqw" Dec 13 01:49:50.604897 kubelet[2444]: E1213 01:49:50.604802 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-c87d4d589-v7pqw_calico-apiserver(db6522ed-ade8-4bda-84b5-172c7548fe69)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-c87d4d589-v7pqw_calico-apiserver(db6522ed-ade8-4bda-84b5-172c7548fe69)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c87d4d589-v7pqw" podUID="db6522ed-ade8-4bda-84b5-172c7548fe69" Dec 13 01:49:50.605820 kubelet[2444]: I1213 01:49:50.605785 2444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:49:50.606529 env[1412]: time="2024-12-13T01:49:50.606500118Z" level=info msg="StopPodSandbox for \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\"" Dec 13 01:49:50.608084 env[1412]: time="2024-12-13T01:49:50.607895411Z" level=error msg="Failed to destroy network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.608538 env[1412]: time="2024-12-13T01:49:50.608499251Z" level=error msg="encountered an error cleaning up failed sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.608702 env[1412]: time="2024-12-13T01:49:50.608657962Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c87d4d589-x5jhp,Uid:d3874a66-1fc2-4d94-8282-e2b409f57d2c,Namespace:calico-apiserver,Attempt:0,} failed, error" error="failed to setup network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.609098 kubelet[2444]: E1213 01:49:50.608936 2444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.609098 kubelet[2444]: E1213 01:49:50.608980 2444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c87d4d589-x5jhp" Dec 13 01:49:50.609098 kubelet[2444]: E1213 01:49:50.609012 2444 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-apiserver/calico-apiserver-c87d4d589-x5jhp" Dec 13 01:49:50.609281 kubelet[2444]: E1213 01:49:50.609056 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-apiserver-c87d4d589-x5jhp_calico-apiserver(d3874a66-1fc2-4d94-8282-e2b409f57d2c)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-apiserver-c87d4d589-x5jhp_calico-apiserver(d3874a66-1fc2-4d94-8282-e2b409f57d2c)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c87d4d589-x5jhp" podUID="d3874a66-1fc2-4d94-8282-e2b409f57d2c" Dec 13 01:49:50.611010 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7-shm.mount: Deactivated successfully. Dec 13 01:49:50.634040 env[1412]: time="2024-12-13T01:49:50.633992350Z" level=error msg="Failed to destroy network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.637579 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c-shm.mount: Deactivated successfully. Dec 13 01:49:50.638851 env[1412]: time="2024-12-13T01:49:50.638797770Z" level=error msg="encountered an error cleaning up failed sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.638964 env[1412]: time="2024-12-13T01:49:50.638873776Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-955cfb777-kkbj7,Uid:3b2e20c2-5f0a-4735-afcc-b2f438a0615b,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.639329 kubelet[2444]: E1213 01:49:50.639149 2444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.639329 kubelet[2444]: E1213 01:49:50.639193 2444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-955cfb777-kkbj7" Dec 13 01:49:50.639329 kubelet[2444]: E1213 01:49:50.639230 2444 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/calico-kube-controllers-955cfb777-kkbj7" Dec 13 01:49:50.639505 kubelet[2444]: E1213 01:49:50.639273 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"calico-kube-controllers-955cfb777-kkbj7_calico-system(3b2e20c2-5f0a-4735-afcc-b2f438a0615b)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"calico-kube-controllers-955cfb777-kkbj7_calico-system(3b2e20c2-5f0a-4735-afcc-b2f438a0615b)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-955cfb777-kkbj7" podUID="3b2e20c2-5f0a-4735-afcc-b2f438a0615b" Dec 13 01:49:50.661081 env[1412]: time="2024-12-13T01:49:50.661032853Z" level=error msg="Failed to destroy network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.664197 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877-shm.mount: Deactivated successfully. Dec 13 01:49:50.665587 env[1412]: time="2024-12-13T01:49:50.665548754Z" level=error msg="encountered an error cleaning up failed sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.665740 env[1412]: time="2024-12-13T01:49:50.665711264Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-chq67,Uid:9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4,Namespace:kube-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.666944 kubelet[2444]: E1213 01:49:50.666026 2444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.666944 kubelet[2444]: E1213 01:49:50.666090 2444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-chq67" Dec 13 01:49:50.666944 kubelet[2444]: E1213 01:49:50.666115 2444 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="kube-system/coredns-6f6b679f8f-chq67" Dec 13 01:49:50.667154 kubelet[2444]: E1213 01:49:50.666167 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"coredns-6f6b679f8f-chq67_kube-system(9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"coredns-6f6b679f8f-chq67_kube-system(9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-chq67" podUID="9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4" Dec 13 01:49:50.673040 env[1412]: time="2024-12-13T01:49:50.672998350Z" level=error msg="Failed to destroy network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\"" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.673557 env[1412]: time="2024-12-13T01:49:50.673484282Z" level=error msg="encountered an error cleaning up failed sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\", marking sandbox state as SANDBOX_UNKNOWN" error="plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.673721 env[1412]: time="2024-12-13T01:49:50.673686896Z" level=error msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t2mmp,Uid:dee8dd51-2759-489b-acfd-de00febc629a,Namespace:calico-system,Attempt:0,} failed, error" error="failed to setup network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.674081 kubelet[2444]: E1213 01:49:50.674025 2444 log.go:32] "RunPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.674187 kubelet[2444]: E1213 01:49:50.674090 2444 kuberuntime_sandbox.go:72] "Failed to create sandbox for pod" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t2mmp" Dec 13 01:49:50.674187 kubelet[2444]: E1213 01:49:50.674114 2444 kuberuntime_manager.go:1168] "CreatePodSandbox for pod failed" err="rpc error: code = Unknown desc = failed to setup network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\": plugin type=\"calico\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" pod="calico-system/csi-node-driver-t2mmp" Dec 13 01:49:50.674187 kubelet[2444]: E1213 01:49:50.674160 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"CreatePodSandbox\" for \"csi-node-driver-t2mmp_calico-system(dee8dd51-2759-489b-acfd-de00febc629a)\" with CreatePodSandboxError: \"Failed to create sandbox for pod \\\"csi-node-driver-t2mmp_calico-system(dee8dd51-2759-489b-acfd-de00febc629a)\\\": rpc error: code = Unknown desc = failed to setup network for sandbox \\\"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\\\": plugin type=\\\"calico\\\" failed (add): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t2mmp" podUID="dee8dd51-2759-489b-acfd-de00febc629a" Dec 13 01:49:50.712620 env[1412]: time="2024-12-13T01:49:50.712555187Z" level=error msg="StopPodSandbox for \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\" failed" error="failed to destroy network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:50.713043 kubelet[2444]: E1213 01:49:50.712779 2444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:49:50.713043 kubelet[2444]: E1213 01:49:50.712843 2444 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de"} Dec 13 01:49:50.713043 kubelet[2444]: E1213 01:49:50.712933 2444 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"739d2c4b-57e6-401b-93fa-cecc2c721ae5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:50.713043 kubelet[2444]: E1213 01:49:50.712962 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"739d2c4b-57e6-401b-93fa-cecc2c721ae5\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-bncnx" podUID="739d2c4b-57e6-401b-93fa-cecc2c721ae5" Dec 13 01:49:51.561761 systemd[1]: run-containerd-io.containerd.grpc.v1.cri-sandboxes-9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f-shm.mount: Deactivated successfully. Dec 13 01:49:51.619593 kubelet[2444]: I1213 01:49:51.619561 2444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:49:51.620992 env[1412]: time="2024-12-13T01:49:51.620952726Z" level=info msg="StopPodSandbox for \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\"" Dec 13 01:49:51.640427 kubelet[2444]: I1213 01:49:51.638307 2444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:49:51.640876 env[1412]: time="2024-12-13T01:49:51.640826231Z" level=info msg="StopPodSandbox for \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\"" Dec 13 01:49:51.641738 kubelet[2444]: I1213 01:49:51.641406 2444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:49:51.642434 env[1412]: time="2024-12-13T01:49:51.642399234Z" level=info msg="StopPodSandbox for \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\"" Dec 13 01:49:51.652228 kubelet[2444]: I1213 01:49:51.652191 2444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:49:51.653134 env[1412]: time="2024-12-13T01:49:51.653104237Z" level=info msg="StopPodSandbox for \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\"" Dec 13 01:49:51.654684 kubelet[2444]: I1213 01:49:51.654181 2444 pod_container_deletor.go:80] "Container not found in pod's containers" containerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:49:51.654977 env[1412]: time="2024-12-13T01:49:51.654951358Z" level=info msg="StopPodSandbox for \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\"" Dec 13 01:49:51.759050 env[1412]: time="2024-12-13T01:49:51.758979490Z" level=error msg="StopPodSandbox for \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\" failed" error="failed to destroy network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:51.759481 env[1412]: time="2024-12-13T01:49:51.759150301Z" level=error msg="StopPodSandbox for \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\" failed" error="failed to destroy network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:51.769995 kubelet[2444]: E1213 01:49:51.769231 2444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:49:51.769995 kubelet[2444]: E1213 01:49:51.769289 2444 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f"} Dec 13 01:49:51.769995 kubelet[2444]: E1213 01:49:51.769336 2444 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"dee8dd51-2759-489b-acfd-de00febc629a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:51.769995 kubelet[2444]: E1213 01:49:51.769384 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"dee8dd51-2759-489b-acfd-de00febc629a\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/csi-node-driver-t2mmp" podUID="dee8dd51-2759-489b-acfd-de00febc629a" Dec 13 01:49:51.770368 kubelet[2444]: E1213 01:49:51.769511 2444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:49:51.770368 kubelet[2444]: E1213 01:49:51.769601 2444 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c"} Dec 13 01:49:51.770368 kubelet[2444]: E1213 01:49:51.769747 2444 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"3b2e20c2-5f0a-4735-afcc-b2f438a0615b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:51.770368 kubelet[2444]: E1213 01:49:51.769847 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"3b2e20c2-5f0a-4735-afcc-b2f438a0615b\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-system/calico-kube-controllers-955cfb777-kkbj7" podUID="3b2e20c2-5f0a-4735-afcc-b2f438a0615b" Dec 13 01:49:51.778223 env[1412]: time="2024-12-13T01:49:51.778166250Z" level=error msg="StopPodSandbox for \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\" failed" error="failed to destroy network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:51.778562 kubelet[2444]: E1213 01:49:51.778531 2444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:49:51.778666 kubelet[2444]: E1213 01:49:51.778633 2444 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1"} Dec 13 01:49:51.778733 kubelet[2444]: E1213 01:49:51.778671 2444 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"db6522ed-ade8-4bda-84b5-172c7548fe69\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:51.778733 kubelet[2444]: E1213 01:49:51.778699 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"db6522ed-ade8-4bda-84b5-172c7548fe69\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c87d4d589-v7pqw" podUID="db6522ed-ade8-4bda-84b5-172c7548fe69" Dec 13 01:49:51.824221 env[1412]: time="2024-12-13T01:49:51.824079265Z" level=error msg="StopPodSandbox for \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\" failed" error="failed to destroy network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:51.825680 kubelet[2444]: E1213 01:49:51.825528 2444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:49:51.825814 kubelet[2444]: E1213 01:49:51.825694 2444 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7"} Dec 13 01:49:51.825814 kubelet[2444]: E1213 01:49:51.825755 2444 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"d3874a66-1fc2-4d94-8282-e2b409f57d2c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:51.825988 kubelet[2444]: E1213 01:49:51.825849 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"d3874a66-1fc2-4d94-8282-e2b409f57d2c\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="calico-apiserver/calico-apiserver-c87d4d589-x5jhp" podUID="d3874a66-1fc2-4d94-8282-e2b409f57d2c" Dec 13 01:49:51.826667 env[1412]: time="2024-12-13T01:49:51.826619432Z" level=error msg="StopPodSandbox for \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\" failed" error="failed to destroy network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" Dec 13 01:49:51.826972 kubelet[2444]: E1213 01:49:51.826936 2444 log.go:32] "StopPodSandbox from runtime service failed" err="rpc error: code = Unknown desc = failed to destroy network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\": plugin type=\"calico\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/" podSandboxID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:49:51.827076 kubelet[2444]: E1213 01:49:51.826980 2444 kuberuntime_manager.go:1477] "Failed to stop sandbox" podSandboxID={"Type":"containerd","ID":"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877"} Dec 13 01:49:51.827076 kubelet[2444]: E1213 01:49:51.827014 2444 kuberuntime_manager.go:1077] "killPodWithSyncResult failed" err="failed to \"KillPodSandbox\" for \"9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" Dec 13 01:49:51.827076 kubelet[2444]: E1213 01:49:51.827039 2444 pod_workers.go:1301] "Error syncing pod, skipping" err="failed to \"KillPodSandbox\" for \"9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4\" with KillPodSandboxError: \"rpc error: code = Unknown desc = failed to destroy network for sandbox \\\"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\\\": plugin type=\\\"calico\\\" failed (delete): stat /var/lib/calico/nodename: no such file or directory: check that the calico/node container is running and has mounted /var/lib/calico/\"" pod="kube-system/coredns-6f6b679f8f-chq67" podUID="9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4" Dec 13 01:49:57.092234 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3562989753.mount: Deactivated successfully. Dec 13 01:49:57.135881 env[1412]: time="2024-12-13T01:49:57.135808668Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:57.142619 env[1412]: time="2024-12-13T01:49:57.142578177Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:57.146546 env[1412]: time="2024-12-13T01:49:57.146516415Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:57.159301 env[1412]: time="2024-12-13T01:49:57.159218982Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node@sha256:99c3917516efe1f807a0cfdf2d14b628b7c5cc6bd8a9ee5a253154f31756bea1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:49:57.160310 env[1412]: time="2024-12-13T01:49:57.160280446Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node:v3.29.1\" returns image reference \"sha256:feb26d4585d68e875d9bd9bd6c27ea9f2d5c9ed9ef70f8b8cb0ebb0559a1d664\"" Dec 13 01:49:57.178035 env[1412]: time="2024-12-13T01:49:57.178003116Z" level=info msg="CreateContainer within sandbox \"725a0d9ce9ee81a6b662a648a9d7028aee0ca6e21dcc1da216fb8a0b25a408f4\" for container &ContainerMetadata{Name:calico-node,Attempt:0,}" Dec 13 01:49:57.205387 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount2521871572.mount: Deactivated successfully. Dec 13 01:49:57.217329 env[1412]: time="2024-12-13T01:49:57.217290488Z" level=info msg="CreateContainer within sandbox \"725a0d9ce9ee81a6b662a648a9d7028aee0ca6e21dcc1da216fb8a0b25a408f4\" for &ContainerMetadata{Name:calico-node,Attempt:0,} returns container id \"74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69\"" Dec 13 01:49:57.222206 env[1412]: time="2024-12-13T01:49:57.218078436Z" level=info msg="StartContainer for \"74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69\"" Dec 13 01:49:57.238159 systemd[1]: Started cri-containerd-74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69.scope. Dec 13 01:49:57.281211 kernel: kauditd_printk_skb: 34 callbacks suppressed Dec 13 01:49:57.281403 kernel: audit: type=1400 audit(1734054597.256:1027): avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.256000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.256000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6d87500858 items=0 ppid=2901 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:57.301692 kernel: audit: type=1300 audit(1734054597.256:1027): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7f6d87500858 items=0 ppid=2901 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:57.305169 kernel: audit: type=1327 audit(1734054597.256:1027): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666438663966336166323534333730366330643233333735323231 Dec 13 01:49:57.256000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666438663966336166323534333730366330643233333735323231 Dec 13 01:49:57.327935 kernel: audit: type=1400 audit(1734054597.257:1028): avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.337149 kernel: audit: type=1400 audit(1734054597.257:1028): avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.369220 env[1412]: time="2024-12-13T01:49:57.369091754Z" level=info msg="StartContainer for \"74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69\" returns successfully" Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.387942 kernel: audit: type=1400 audit(1734054597.257:1028): avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.420008 kernel: audit: type=1400 audit(1734054597.257:1028): avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.420149 kernel: audit: type=1400 audit(1734054597.257:1028): avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.420188 kernel: audit: type=1400 audit(1734054597.257:1028): avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.449110 kernel: audit: type=1400 audit(1734054597.257:1028): avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.257000 audit: BPF prog-id=140 op=LOAD Dec 13 01:49:57.257000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c0002afbd8 items=0 ppid=2901 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:57.257000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666438663966336166323534333730366330643233333735323231 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit: BPF prog-id=141 op=LOAD Dec 13 01:49:57.280000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c0002afc28 items=0 ppid=2901 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:57.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666438663966336166323534333730366330643233333735323231 Dec 13 01:49:57.280000 audit: BPF prog-id=141 op=UNLOAD Dec 13 01:49:57.280000 audit: BPF prog-id=140 op=UNLOAD Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { perfmon } for pid=3482 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit[3482]: AVC avc: denied { bpf } for pid=3482 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:57.280000 audit: BPF prog-id=142 op=LOAD Dec 13 01:49:57.280000 audit[3482]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c0002afcb8 items=0 ppid=2901 pid=3482 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:57.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3734666438663966336166323534333730366330643233333735323231 Dec 13 01:49:57.709404 kernel: wireguard: WireGuard 1.0.0 loaded. See www.wireguard.com for information. Dec 13 01:49:57.709586 kernel: wireguard: Copyright (C) 2015-2019 Jason A. Donenfeld . All Rights Reserved. Dec 13 01:49:59.039000 audit[3623]: AVC avc: denied { write } for pid=3623 comm="tee" name="fd" dev="proc" ino=29376 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:59.039000 audit[3623]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffca3a2da10 a2=241 a3=1b6 items=1 ppid=3597 pid=3623 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.039000 audit: CWD cwd="/etc/service/enabled/confd/log" Dec 13 01:49:59.039000 audit: PATH item=0 name="/dev/fd/63" inode=29872 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:59.039000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:59.048000 audit[3646]: AVC avc: denied { write } for pid=3646 comm="tee" name="fd" dev="proc" ino=29385 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:59.050000 audit[3650]: AVC avc: denied { write } for pid=3650 comm="tee" name="fd" dev="proc" ino=29388 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:59.064000 audit[3653]: AVC avc: denied { write } for pid=3653 comm="tee" name="fd" dev="proc" ino=29391 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:59.048000 audit[3646]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffed0238a10 a2=241 a3=1b6 items=1 ppid=3607 pid=3646 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.048000 audit: CWD cwd="/etc/service/enabled/felix/log" Dec 13 01:49:59.048000 audit: PATH item=0 name="/dev/fd/63" inode=29879 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:59.048000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:59.050000 audit[3650]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd157bca12 a2=241 a3=1b6 items=1 ppid=3593 pid=3650 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.050000 audit: CWD cwd="/etc/service/enabled/cni/log" Dec 13 01:49:59.050000 audit: PATH item=0 name="/dev/fd/63" inode=29366 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:59.050000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:59.068000 audit[3665]: AVC avc: denied { write } for pid=3665 comm="tee" name="fd" dev="proc" ino=29394 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:59.069000 audit[3657]: AVC avc: denied { write } for pid=3657 comm="tee" name="fd" dev="proc" ino=29397 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:59.064000 audit[3653]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe00f28a10 a2=241 a3=1b6 items=1 ppid=3601 pid=3653 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.064000 audit: CWD cwd="/etc/service/enabled/bird6/log" Dec 13 01:49:59.064000 audit: PATH item=0 name="/dev/fd/63" inode=29369 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:59.064000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:59.073000 audit[3663]: AVC avc: denied { write } for pid=3663 comm="tee" name="fd" dev="proc" ino=29401 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=0 Dec 13 01:49:59.073000 audit[3663]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffceea03a11 a2=241 a3=1b6 items=1 ppid=3599 pid=3663 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.073000 audit: CWD cwd="/etc/service/enabled/bird/log" Dec 13 01:49:59.073000 audit: PATH item=0 name="/dev/fd/63" inode=29377 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:59.069000 audit[3657]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffd78980a01 a2=241 a3=1b6 items=1 ppid=3605 pid=3657 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.069000 audit: CWD cwd="/etc/service/enabled/node-status-reporter/log" Dec 13 01:49:59.069000 audit: PATH item=0 name="/dev/fd/63" inode=29372 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:59.069000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:59.073000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:59.068000 audit[3665]: SYSCALL arch=c000003e syscall=257 success=yes exit=3 a0=ffffff9c a1=7ffe1b85fa00 a2=241 a3=1b6 items=1 ppid=3609 pid=3665 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="tee" exe="/usr/bin/coreutils" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.068000 audit: CWD cwd="/etc/service/enabled/allocate-tunnel-addrs/log" Dec 13 01:49:59.068000 audit: PATH item=0 name="/dev/fd/63" inode=29380 dev=00:0c mode=010600 ouid=0 ogid=0 rdev=00:00 obj=system_u:system_r:kernel_t:s0 nametype=NORMAL cap_fp=0 cap_fi=0 cap_fe=0 cap_fver=0 cap_frootid=0 Dec 13 01:49:59.068000 audit: PROCTITLE proctitle=2F7573722F62696E2F636F72657574696C73002D2D636F72657574696C732D70726F672D73686562616E673D746565002F7573722F62696E2F746565002F6465762F66642F3633 Dec 13 01:49:59.269000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.269000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.269000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.269000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.269000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.269000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.269000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.269000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.269000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.269000 audit: BPF prog-id=143 op=LOAD Dec 13 01:49:59.269000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc18ab2460 a2=98 a3=3 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.269000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.271000 audit: BPF prog-id=143 op=UNLOAD Dec 13 01:49:59.271000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.271000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.271000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.271000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.271000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.271000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.271000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.271000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.271000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.271000 audit: BPF prog-id=144 op=LOAD Dec 13 01:49:59.271000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc18ab2240 a2=74 a3=540051 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.271000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.272000 audit: BPF prog-id=144 op=UNLOAD Dec 13 01:49:59.273000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.273000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.273000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.273000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.273000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.273000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.273000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.273000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.273000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.273000 audit: BPF prog-id=145 op=LOAD Dec 13 01:49:59.273000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc18ab2270 a2=94 a3=2 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.273000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.274000 audit: BPF prog-id=145 op=UNLOAD Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit: BPF prog-id=146 op=LOAD Dec 13 01:49:59.406000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffc18ab2130 a2=40 a3=1 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.406000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.406000 audit: BPF prog-id=146 op=UNLOAD Dec 13 01:49:59.406000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.406000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffc18ab2200 a2=50 a3=7ffc18ab22e0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.406000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.417000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.417000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc18ab2140 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.417000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.417000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc18ab2170 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.417000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.417000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc18ab2080 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.417000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.417000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc18ab2190 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.417000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.417000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc18ab2170 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.417000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.417000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc18ab2160 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.417000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.417000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc18ab2190 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.417000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.417000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc18ab2170 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.417000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc18ab2190 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffc18ab2160 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffc18ab21d0 a2=28 a3=0 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc18ab1f80 a2=50 a3=1 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit: BPF prog-id=147 op=LOAD Dec 13 01:49:59.418000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffc18ab1f80 a2=94 a3=5 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.418000 audit: BPF prog-id=147 op=UNLOAD Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffc18ab2030 a2=50 a3=1 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffc18ab2150 a2=4 a3=38 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:59.418000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc18ab21a0 a2=94 a3=6 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.418000 audit[3701]: AVC avc: denied { confidentiality } for pid=3701 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:59.418000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc18ab1950 a2=94 a3=83 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.418000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.419000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.419000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.419000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.419000 audit[3701]: AVC avc: denied { bpf } for pid=3701 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.419000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.419000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.419000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.419000 audit[3701]: AVC avc: denied { perfmon } for pid=3701 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.419000 audit[3701]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffc18ab1950 a2=94 a3=83 items=0 ppid=3608 pid=3701 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.419000 audit: PROCTITLE proctitle=627066746F6F6C006D6170006C697374002D2D6A736F6E Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit: BPF prog-id=148 op=LOAD Dec 13 01:49:59.427000 audit[3704]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5ea92ae0 a2=98 a3=1999999999999999 items=0 ppid=3608 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.427000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:59.427000 audit: BPF prog-id=148 op=UNLOAD Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit: BPF prog-id=149 op=LOAD Dec 13 01:49:59.427000 audit[3704]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5ea929c0 a2=74 a3=ffff items=0 ppid=3608 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.427000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:59.427000 audit: BPF prog-id=149 op=UNLOAD Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { perfmon } for pid=3704 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit[3704]: AVC avc: denied { bpf } for pid=3704 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.427000 audit: BPF prog-id=150 op=LOAD Dec 13 01:49:59.427000 audit[3704]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffc5ea92a00 a2=40 a3=7ffc5ea92be0 items=0 ppid=3608 pid=3704 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.427000 audit: PROCTITLE proctitle=627066746F6F6C006D617000637265617465002F7379732F66732F6270662F63616C69636F2F63616C69636F5F6661696C736166655F706F7274735F763100747970650068617368006B657900340076616C7565003100656E7472696573003635353335006E616D650063616C69636F5F6661696C736166655F706F7274735F Dec 13 01:49:59.427000 audit: BPF prog-id=150 op=UNLOAD Dec 13 01:49:59.499138 systemd-networkd[1565]: vxlan.calico: Link UP Dec 13 01:49:59.499149 systemd-networkd[1565]: vxlan.calico: Gained carrier Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit: BPF prog-id=151 op=LOAD Dec 13 01:49:59.539000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd690ac20 a2=98 a3=ffffffff items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.539000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.539000 audit: BPF prog-id=151 op=UNLOAD Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit: BPF prog-id=152 op=LOAD Dec 13 01:49:59.539000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd690aa30 a2=74 a3=540051 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.539000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.539000 audit: BPF prog-id=152 op=UNLOAD Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.539000 audit: BPF prog-id=153 op=LOAD Dec 13 01:49:59.539000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7fffd690aa60 a2=94 a3=2 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.539000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit: BPF prog-id=153 op=UNLOAD Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd690a930 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd690a960 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd690a870 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd690a980 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd690a960 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd690a950 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd690a980 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd690a960 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd690a980 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7fffd690a950 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=12 a1=7fffd690a9c0 a2=28 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.540000 audit: BPF prog-id=154 op=LOAD Dec 13 01:49:59.540000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd690a830 a2=40 a3=0 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.540000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.540000 audit: BPF prog-id=154 op=UNLOAD Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=0 a1=7fffd690a820 a2=50 a3=2800 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.541000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=0 a1=7fffd690a820 a2=50 a3=2800 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.541000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit: BPF prog-id=155 op=LOAD Dec 13 01:49:59.541000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd690a040 a2=94 a3=2 items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.541000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.541000 audit: BPF prog-id=155 op=UNLOAD Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { perfmon } for pid=3733 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit[3733]: AVC avc: denied { bpf } for pid=3733 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.541000 audit: BPF prog-id=156 op=LOAD Dec 13 01:49:59.541000 audit[3733]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7fffd690a140 a2=94 a3=2d items=0 ppid=3608 pid=3733 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.541000 audit: PROCTITLE proctitle=627066746F6F6C0070726F67006C6F6164002F7573722F6C69622F63616C69636F2F6270662F66696C7465722E6F002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41007479706500786470 Dec 13 01:49:59.558000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.558000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.558000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.558000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.558000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.558000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.558000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.558000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.558000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.558000 audit: BPF prog-id=157 op=LOAD Dec 13 01:49:59.558000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=3 a0=5 a1=7ffe6d700ff0 a2=98 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.558000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.558000 audit: BPF prog-id=157 op=UNLOAD Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit: BPF prog-id=158 op=LOAD Dec 13 01:49:59.559000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe6d700dd0 a2=74 a3=540051 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.559000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.559000 audit: BPF prog-id=158 op=UNLOAD Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.559000 audit: BPF prog-id=159 op=LOAD Dec 13 01:49:59.559000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe6d700e00 a2=94 a3=2 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.559000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.559000 audit: BPF prog-id=159 op=UNLOAD Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit: BPF prog-id=160 op=LOAD Dec 13 01:49:59.674000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=5 a1=7ffe6d700cc0 a2=40 a3=1 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.674000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.674000 audit: BPF prog-id=160 op=UNLOAD Dec 13 01:49:59.674000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.674000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=0 a1=7ffe6d700d90 a2=50 a3=7ffe6d700e70 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.674000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6d700cd0 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6d700d00 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6d700c10 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6d700d20 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6d700d00 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6d700cf0 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6d700d20 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6d700d00 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6d700d20 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=12 a1=7ffe6d700cf0 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=4 a0=12 a1=7ffe6d700d60 a2=28 a3=0 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe6d700b10 a2=50 a3=1 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit: BPF prog-id=161 op=LOAD Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=6 a0=5 a1=7ffe6d700b10 a2=94 a3=5 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit: BPF prog-id=161 op=UNLOAD Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=5 a0=0 a1=7ffe6d700bc0 a2=50 a3=1 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=16 a1=7ffe6d700ce0 a2=4 a3=38 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.689000 audit[3738]: AVC avc: denied { confidentiality } for pid=3738 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:59.689000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe6d700d30 a2=94 a3=6 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.689000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { confidentiality } for pid=3738 comm="bpftool" lockdown_reason="use of bpf to read kernel RAM" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=lockdown permissive=0 Dec 13 01:49:59.690000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe6d7004e0 a2=94 a3=83 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.690000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { perfmon } for pid=3738 comm="bpftool" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=no exit=-22 a0=5 a1=7ffe6d7004e0 a2=94 a3=83 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.690000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.690000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.690000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe6d701f20 a2=10 a3=f1f00800 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.690000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.691000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.691000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe6d701dc0 a2=10 a3=3 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.691000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.691000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.691000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe6d701d60 a2=10 a3=3 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.691000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.691000 audit[3738]: AVC avc: denied { bpf } for pid=3738 comm="bpftool" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:49:59.691000 audit[3738]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=7ffe6d701d60 a2=10 a3=7 items=0 ppid=3608 pid=3738 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="bpftool" exe="/usr/bin/bpftool" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.691000 audit: PROCTITLE proctitle=627066746F6F6C002D2D6A736F6E002D2D7072657474790070726F670073686F770070696E6E6564002F7379732F66732F6270662F63616C69636F2F7864702F70726566696C7465725F76315F63616C69636F5F746D705F41 Dec 13 01:49:59.701000 audit: BPF prog-id=156 op=UNLOAD Dec 13 01:49:59.838000 audit[3760]: NETFILTER_CFG table=nat:101 family=2 entries=15 op=nft_register_chain pid=3760 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:59.838000 audit[3760]: SYSCALL arch=c000003e syscall=46 success=yes exit=5084 a0=3 a1=7ffd2d85b2e0 a2=0 a3=7ffd2d85b2cc items=0 ppid=3608 pid=3760 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.838000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:59.839000 audit[3765]: NETFILTER_CFG table=mangle:102 family=2 entries=16 op=nft_register_chain pid=3765 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:59.839000 audit[3765]: SYSCALL arch=c000003e syscall=46 success=yes exit=6868 a0=3 a1=7fff62341810 a2=0 a3=7fff623417fc items=0 ppid=3608 pid=3765 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.839000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:59.851000 audit[3761]: NETFILTER_CFG table=raw:103 family=2 entries=21 op=nft_register_chain pid=3761 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:59.851000 audit[3761]: SYSCALL arch=c000003e syscall=46 success=yes exit=8452 a0=3 a1=7ffcfb52e270 a2=0 a3=7ffcfb52e25c items=0 ppid=3608 pid=3761 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.851000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:49:59.890000 audit[3763]: NETFILTER_CFG table=filter:104 family=2 entries=39 op=nft_register_chain pid=3763 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:49:59.890000 audit[3763]: SYSCALL arch=c000003e syscall=46 success=yes exit=18968 a0=3 a1=7fffea5d9250 a2=0 a3=7fffea5d923c items=0 ppid=3608 pid=3763 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:49:59.890000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:50:00.756058 systemd-networkd[1565]: vxlan.calico: Gained IPv6LL Dec 13 01:50:02.485766 env[1412]: time="2024-12-13T01:50:02.485475367Z" level=info msg="StopPodSandbox for \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\"" Dec 13 01:50:02.540872 kubelet[2444]: I1213 01:50:02.540337 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-node-vtqch" podStartSLOduration=6.083177218 podStartE2EDuration="27.540322076s" podCreationTimestamp="2024-12-13 01:49:35 +0000 UTC" firstStartedPulling="2024-12-13 01:49:35.704076344 +0000 UTC m=+13.328115219" lastFinishedPulling="2024-12-13 01:49:57.161221202 +0000 UTC m=+34.785260077" observedRunningTime="2024-12-13 01:49:57.721177914 +0000 UTC m=+35.345216889" watchObservedRunningTime="2024-12-13 01:50:02.540322076 +0000 UTC m=+40.164360951" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.541 [INFO][3788] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.542 [INFO][3788] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" iface="eth0" netns="/var/run/netns/cni-79a26e5b-40ac-2bb9-4552-6ee4089a4746" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.542 [INFO][3788] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" iface="eth0" netns="/var/run/netns/cni-79a26e5b-40ac-2bb9-4552-6ee4089a4746" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.542 [INFO][3788] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" iface="eth0" netns="/var/run/netns/cni-79a26e5b-40ac-2bb9-4552-6ee4089a4746" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.542 [INFO][3788] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.542 [INFO][3788] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.569 [INFO][3794] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" HandleID="k8s-pod-network.2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.569 [INFO][3794] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.569 [INFO][3794] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.575 [WARNING][3794] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" HandleID="k8s-pod-network.2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.575 [INFO][3794] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" HandleID="k8s-pod-network.2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.576 [INFO][3794] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:02.580031 env[1412]: 2024-12-13 01:50:02.578 [INFO][3788] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:02.584114 systemd[1]: run-netns-cni\x2d79a26e5b\x2d40ac\x2d2bb9\x2d4552\x2d6ee4089a4746.mount: Deactivated successfully. Dec 13 01:50:02.585729 env[1412]: time="2024-12-13T01:50:02.584114758Z" level=info msg="TearDown network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\" successfully" Dec 13 01:50:02.585729 env[1412]: time="2024-12-13T01:50:02.584160060Z" level=info msg="StopPodSandbox for \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\" returns successfully" Dec 13 01:50:02.586288 env[1412]: time="2024-12-13T01:50:02.586254979Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-bncnx,Uid:739d2c4b-57e6-401b-93fa-cecc2c721ae5,Namespace:kube-system,Attempt:1,}" Dec 13 01:50:02.728710 systemd-networkd[1565]: caliad07bb0a5d9: Link UP Dec 13 01:50:02.736057 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:50:02.742979 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): caliad07bb0a5d9: link becomes ready Dec 13 01:50:02.742944 systemd-networkd[1565]: caliad07bb0a5d9: Gained carrier Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.661 [INFO][3803] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0 coredns-6f6b679f8f- kube-system 739d2c4b-57e6-401b-93fa-cecc2c721ae5 742 0 2024-12-13 01:49:27 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-92bad84337 coredns-6f6b679f8f-bncnx eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] caliad07bb0a5d9 [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Namespace="kube-system" Pod="coredns-6f6b679f8f-bncnx" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.661 [INFO][3803] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Namespace="kube-system" Pod="coredns-6f6b679f8f-bncnx" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.690 [INFO][3813] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" HandleID="k8s-pod-network.0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.699 [INFO][3813] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" HandleID="k8s-pod-network.0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0004d4a80), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-92bad84337", "pod":"coredns-6f6b679f8f-bncnx", "timestamp":"2024-12-13 01:50:02.690457886 +0000 UTC"}, Hostname:"ci-3510.3.6-a-92bad84337", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.699 [INFO][3813] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.699 [INFO][3813] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.699 [INFO][3813] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-92bad84337' Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.701 [INFO][3813] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.704 [INFO][3813] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.707 [INFO][3813] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.709 [INFO][3813] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.711 [INFO][3813] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.711 [INFO][3813] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.712 [INFO][3813] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4 Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.718 [INFO][3813] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.724 [INFO][3813] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.1/26] block=192.168.55.0/26 handle="k8s-pod-network.0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.724 [INFO][3813] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.1/26] handle="k8s-pod-network.0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.724 [INFO][3813] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:02.766186 env[1412]: 2024-12-13 01:50:02.724 [INFO][3813] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.1/26] IPv6=[] ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" HandleID="k8s-pod-network.0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.767163 env[1412]: 2024-12-13 01:50:02.726 [INFO][3803] cni-plugin/k8s.go 386: Populated endpoint ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Namespace="kube-system" Pod="coredns-6f6b679f8f-bncnx" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"739d2c4b-57e6-401b-93fa-cecc2c721ae5", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"", Pod:"coredns-6f6b679f8f-bncnx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.55.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliad07bb0a5d9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:02.767163 env[1412]: 2024-12-13 01:50:02.726 [INFO][3803] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.1/32] ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Namespace="kube-system" Pod="coredns-6f6b679f8f-bncnx" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.767163 env[1412]: 2024-12-13 01:50:02.726 [INFO][3803] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to caliad07bb0a5d9 ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Namespace="kube-system" Pod="coredns-6f6b679f8f-bncnx" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.767163 env[1412]: 2024-12-13 01:50:02.744 [INFO][3803] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Namespace="kube-system" Pod="coredns-6f6b679f8f-bncnx" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.767163 env[1412]: 2024-12-13 01:50:02.744 [INFO][3803] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Namespace="kube-system" Pod="coredns-6f6b679f8f-bncnx" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"739d2c4b-57e6-401b-93fa-cecc2c721ae5", ResourceVersion:"742", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4", Pod:"coredns-6f6b679f8f-bncnx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.55.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliad07bb0a5d9", MAC:"e2:8a:1a:1a:80:f9", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:02.767163 env[1412]: 2024-12-13 01:50:02.764 [INFO][3803] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4" Namespace="kube-system" Pod="coredns-6f6b679f8f-bncnx" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:02.795232 kernel: kauditd_printk_skb: 560 callbacks suppressed Dec 13 01:50:02.795341 kernel: audit: type=1325 audit(1734054602.776:1135): table=filter:105 family=2 entries=34 op=nft_register_chain pid=3833 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:50:02.776000 audit[3833]: NETFILTER_CFG table=filter:105 family=2 entries=34 op=nft_register_chain pid=3833 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:50:02.776000 audit[3833]: SYSCALL arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc29bdcc30 a2=0 a3=7ffc29bdcc1c items=0 ppid=3608 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:02.815824 env[1412]: time="2024-12-13T01:50:02.799738680Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:50:02.815824 env[1412]: time="2024-12-13T01:50:02.799792783Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:50:02.815824 env[1412]: time="2024-12-13T01:50:02.799814384Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:50:02.815824 env[1412]: time="2024-12-13T01:50:02.800020096Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4 pid=3841 runtime=io.containerd.runc.v2 Dec 13 01:50:02.817382 kernel: audit: type=1300 audit(1734054602.776:1135): arch=c000003e syscall=46 success=yes exit=19148 a0=3 a1=7ffc29bdcc30 a2=0 a3=7ffc29bdcc1c items=0 ppid=3608 pid=3833 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:02.776000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:50:02.832125 kernel: audit: type=1327 audit(1734054602.776:1135): proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:50:02.844675 systemd[1]: Started cri-containerd-0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4.scope. Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.876489 kernel: audit: type=1400 audit(1734054602.858:1136): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.892939 kernel: audit: type=1400 audit(1734054602.858:1137): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.905934 kernel: audit: type=1400 audit(1734054602.858:1138): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.919124 kernel: audit: type=1400 audit(1734054602.858:1139): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.919173 kernel: audit: type=1400 audit(1734054602.858:1140): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.933539 kernel: audit: type=1400 audit(1734054602.858:1141): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.934666 env[1412]: time="2024-12-13T01:50:02.934630026Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-bncnx,Uid:739d2c4b-57e6-401b-93fa-cecc2c721ae5,Namespace:kube-system,Attempt:1,} returns sandbox id \"0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4\"" Dec 13 01:50:02.937280 env[1412]: time="2024-12-13T01:50:02.937251675Z" level=info msg="CreateContainer within sandbox \"0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.956993 kernel: audit: type=1400 audit(1734054602.858:1142): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.858000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.858000 audit: BPF prog-id=162 op=LOAD Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3841 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:02.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396232373866363262376566376165663234626339383832353335 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3841 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:02.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396232373866363262376566376165663234626339383832353335 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.865000 audit: BPF prog-id=163 op=LOAD Dec 13 01:50:02.865000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0000255b0 items=0 ppid=3841 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:02.865000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396232373866363262376566376165663234626339383832353335 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit: BPF prog-id=164 op=LOAD Dec 13 01:50:02.874000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0000255f8 items=0 ppid=3841 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:02.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396232373866363262376566376165663234626339383832353335 Dec 13 01:50:02.874000 audit: BPF prog-id=164 op=UNLOAD Dec 13 01:50:02.874000 audit: BPF prog-id=163 op=UNLOAD Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { perfmon } for pid=3854 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit[3854]: AVC avc: denied { bpf } for pid=3854 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:02.874000 audit: BPF prog-id=165 op=LOAD Dec 13 01:50:02.874000 audit[3854]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000025a08 items=0 ppid=3841 pid=3854 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:02.874000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3061396232373866363262376566376165663234626339383832353335 Dec 13 01:50:02.971813 env[1412]: time="2024-12-13T01:50:02.971785632Z" level=info msg="CreateContainer within sandbox \"0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"cffd9647eb3deb6991f981556dfdcf658c454ec07062b33748e91b2eb3eff4fa\"" Dec 13 01:50:02.973036 env[1412]: time="2024-12-13T01:50:02.973011902Z" level=info msg="StartContainer for \"cffd9647eb3deb6991f981556dfdcf658c454ec07062b33748e91b2eb3eff4fa\"" Dec 13 01:50:02.990236 systemd[1]: Started cri-containerd-cffd9647eb3deb6991f981556dfdcf658c454ec07062b33748e91b2eb3eff4fa.scope. Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.004000 audit: BPF prog-id=166 op=LOAD Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014fc48 a2=10 a3=1c items=0 ppid=3841 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:03.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666439363437656233646562363939316639383135353664666463 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014f6b0 a2=3c a3=8 items=0 ppid=3841 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:03.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666439363437656233646562363939316639383135353664666463 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit: BPF prog-id=167 op=LOAD Dec 13 01:50:03.005000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014f9d8 a2=78 a3=c00028db70 items=0 ppid=3841 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:03.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666439363437656233646562363939316639383135353664666463 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.005000 audit: BPF prog-id=168 op=LOAD Dec 13 01:50:03.005000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014f770 a2=78 a3=c00028dbb8 items=0 ppid=3841 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:03.005000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666439363437656233646562363939316639383135353664666463 Dec 13 01:50:03.005000 audit: BPF prog-id=168 op=UNLOAD Dec 13 01:50:03.005000 audit: BPF prog-id=167 op=UNLOAD Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { perfmon } for pid=3884 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit[3884]: AVC avc: denied { bpf } for pid=3884 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:03.007000 audit: BPF prog-id=169 op=LOAD Dec 13 01:50:03.007000 audit[3884]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014fc30 a2=78 a3=c00028dfc8 items=0 ppid=3841 pid=3884 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:03.007000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6366666439363437656233646562363939316639383135353664666463 Dec 13 01:50:03.024250 env[1412]: time="2024-12-13T01:50:03.024178186Z" level=info msg="StartContainer for \"cffd9647eb3deb6991f981556dfdcf658c454ec07062b33748e91b2eb3eff4fa\" returns successfully" Dec 13 01:50:03.585376 systemd[1]: run-containerd-runc-k8s.io-0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4-runc.WMwRBF.mount: Deactivated successfully. Dec 13 01:50:03.709631 kubelet[2444]: I1213 01:50:03.709570 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-bncnx" podStartSLOduration=36.709548574 podStartE2EDuration="36.709548574s" podCreationTimestamp="2024-12-13 01:49:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:50:03.695491087 +0000 UTC m=+41.319529962" watchObservedRunningTime="2024-12-13 01:50:03.709548574 +0000 UTC m=+41.333587549" Dec 13 01:50:03.717000 audit[3914]: NETFILTER_CFG table=filter:106 family=2 entries=16 op=nft_register_rule pid=3914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:03.717000 audit[3914]: SYSCALL arch=c000003e syscall=46 success=yes exit=5992 a0=3 a1=7ffd94ef9db0 a2=0 a3=7ffd94ef9d9c items=0 ppid=2621 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:03.717000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:03.722000 audit[3914]: NETFILTER_CFG table=nat:107 family=2 entries=14 op=nft_register_rule pid=3914 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:03.722000 audit[3914]: SYSCALL arch=c000003e syscall=46 success=yes exit=3468 a0=3 a1=7ffd94ef9db0 a2=0 a3=0 items=0 ppid=2621 pid=3914 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:03.722000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:03.732000 audit[3916]: NETFILTER_CFG table=filter:108 family=2 entries=13 op=nft_register_rule pid=3916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:03.732000 audit[3916]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff8daf92e0 a2=0 a3=7fff8daf92cc items=0 ppid=2621 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:03.732000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:03.737000 audit[3916]: NETFILTER_CFG table=nat:109 family=2 entries=35 op=nft_register_chain pid=3916 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:03.737000 audit[3916]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fff8daf92e0 a2=0 a3=7fff8daf92cc items=0 ppid=2621 pid=3916 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:03.737000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:04.404256 systemd-networkd[1565]: caliad07bb0a5d9: Gained IPv6LL Dec 13 01:50:04.484629 env[1412]: time="2024-12-13T01:50:04.484575870Z" level=info msg="StopPodSandbox for \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\"" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.534 [INFO][3932] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.534 [INFO][3932] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" iface="eth0" netns="/var/run/netns/cni-dc961e8d-4d07-ad3c-7e77-7f16809a5940" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.534 [INFO][3932] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" iface="eth0" netns="/var/run/netns/cni-dc961e8d-4d07-ad3c-7e77-7f16809a5940" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.535 [INFO][3932] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" iface="eth0" netns="/var/run/netns/cni-dc961e8d-4d07-ad3c-7e77-7f16809a5940" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.535 [INFO][3932] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.535 [INFO][3932] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.556 [INFO][3939] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" HandleID="k8s-pod-network.d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.556 [INFO][3939] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.556 [INFO][3939] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.567 [WARNING][3939] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" HandleID="k8s-pod-network.d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.567 [INFO][3939] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" HandleID="k8s-pod-network.d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.570 [INFO][3939] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:04.572620 env[1412]: 2024-12-13 01:50:04.571 [INFO][3932] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:04.575134 env[1412]: time="2024-12-13T01:50:04.575083281Z" level=info msg="TearDown network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\" successfully" Dec 13 01:50:04.575304 env[1412]: time="2024-12-13T01:50:04.575281792Z" level=info msg="StopPodSandbox for \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\" returns successfully" Dec 13 01:50:04.576178 env[1412]: time="2024-12-13T01:50:04.576142439Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c87d4d589-v7pqw,Uid:db6522ed-ade8-4bda-84b5-172c7548fe69,Namespace:calico-apiserver,Attempt:1,}" Dec 13 01:50:04.578045 systemd[1]: run-netns-cni\x2ddc961e8d\x2d4d07\x2dad3c\x2d7e77\x2d7f16809a5940.mount: Deactivated successfully. Dec 13 01:50:04.711704 systemd-networkd[1565]: calif91c9a0c2da: Link UP Dec 13 01:50:04.716941 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:50:04.717029 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calif91c9a0c2da: link becomes ready Dec 13 01:50:04.725186 systemd-networkd[1565]: calif91c9a0c2da: Gained carrier Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.640 [INFO][3945] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0 calico-apiserver-c87d4d589- calico-apiserver db6522ed-ade8-4bda-84b5-172c7548fe69 762 0 2024-12-13 01:49:34 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c87d4d589 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-92bad84337 calico-apiserver-c87d4d589-v7pqw eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calif91c9a0c2da [] []}} ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-v7pqw" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.640 [INFO][3945] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-v7pqw" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.670 [INFO][3957] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" HandleID="k8s-pod-network.2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.679 [INFO][3957] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" HandleID="k8s-pod-network.2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000333110), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-92bad84337", "pod":"calico-apiserver-c87d4d589-v7pqw", "timestamp":"2024-12-13 01:50:04.670014236 +0000 UTC"}, Hostname:"ci-3510.3.6-a-92bad84337", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.679 [INFO][3957] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.679 [INFO][3957] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.679 [INFO][3957] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-92bad84337' Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.680 [INFO][3957] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.685 [INFO][3957] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.688 [INFO][3957] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.689 [INFO][3957] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.691 [INFO][3957] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.691 [INFO][3957] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.693 [INFO][3957] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713 Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.697 [INFO][3957] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.706 [INFO][3957] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.2/26] block=192.168.55.0/26 handle="k8s-pod-network.2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.706 [INFO][3957] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.2/26] handle="k8s-pod-network.2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.706 [INFO][3957] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:04.741114 env[1412]: 2024-12-13 01:50:04.706 [INFO][3957] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.2/26] IPv6=[] ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" HandleID="k8s-pod-network.2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.742145 env[1412]: 2024-12-13 01:50:04.708 [INFO][3945] cni-plugin/k8s.go 386: Populated endpoint ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-v7pqw" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0", GenerateName:"calico-apiserver-c87d4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"db6522ed-ade8-4bda-84b5-172c7548fe69", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c87d4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"", Pod:"calico-apiserver-c87d4d589-v7pqw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.55.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif91c9a0c2da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:04.742145 env[1412]: 2024-12-13 01:50:04.708 [INFO][3945] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.2/32] ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-v7pqw" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.742145 env[1412]: 2024-12-13 01:50:04.708 [INFO][3945] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calif91c9a0c2da ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-v7pqw" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.742145 env[1412]: 2024-12-13 01:50:04.725 [INFO][3945] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-v7pqw" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.742145 env[1412]: 2024-12-13 01:50:04.726 [INFO][3945] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-v7pqw" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0", GenerateName:"calico-apiserver-c87d4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"db6522ed-ade8-4bda-84b5-172c7548fe69", ResourceVersion:"762", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c87d4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713", Pod:"calico-apiserver-c87d4d589-v7pqw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.55.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif91c9a0c2da", MAC:"de:0c:2d:38:7d:0e", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:04.742145 env[1412]: 2024-12-13 01:50:04.739 [INFO][3945] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-v7pqw" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:04.754000 audit[3976]: NETFILTER_CFG table=filter:110 family=2 entries=44 op=nft_register_chain pid=3976 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:50:04.754000 audit[3976]: SYSCALL arch=c000003e syscall=46 success=yes exit=24680 a0=3 a1=7ffe6abb9770 a2=0 a3=7ffe6abb975c items=0 ppid=3608 pid=3976 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:04.754000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:50:04.765256 env[1412]: time="2024-12-13T01:50:04.765194605Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:50:04.765256 env[1412]: time="2024-12-13T01:50:04.765232207Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:50:04.765459 env[1412]: time="2024-12-13T01:50:04.765407717Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:50:04.765753 env[1412]: time="2024-12-13T01:50:04.765692833Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713 pid=3984 runtime=io.containerd.runc.v2 Dec 13 01:50:04.790884 systemd[1]: Started cri-containerd-2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713.scope. Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.804000 audit: BPF prog-id=170 op=LOAD Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=3984 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:04.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633635343461626634663165313136626531623764336330386436 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=3984 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:04.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633635343461626634663165313136626531623764336330386436 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit: BPF prog-id=171 op=LOAD Dec 13 01:50:04.805000 audit[3994]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001459d8 a2=78 a3=c0001bf8d0 items=0 ppid=3984 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:04.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633635343461626634663165313136626531623764336330386436 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit: BPF prog-id=172 op=LOAD Dec 13 01:50:04.805000 audit[3994]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000145770 a2=78 a3=c0001bf918 items=0 ppid=3984 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:04.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633635343461626634663165313136626531623764336330386436 Dec 13 01:50:04.805000 audit: BPF prog-id=172 op=UNLOAD Dec 13 01:50:04.805000 audit: BPF prog-id=171 op=UNLOAD Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { perfmon } for pid=3994 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit[3994]: AVC avc: denied { bpf } for pid=3994 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:04.805000 audit: BPF prog-id=173 op=LOAD Dec 13 01:50:04.805000 audit[3994]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000145c30 a2=78 a3=c0001bfd28 items=0 ppid=3984 pid=3994 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:04.805000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265633635343461626634663165313136626531623764336330386436 Dec 13 01:50:04.835999 env[1412]: time="2024-12-13T01:50:04.835955122Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c87d4d589-v7pqw,Uid:db6522ed-ade8-4bda-84b5-172c7548fe69,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713\"" Dec 13 01:50:04.837894 env[1412]: time="2024-12-13T01:50:04.837859828Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 01:50:05.484731 env[1412]: time="2024-12-13T01:50:05.484677433Z" level=info msg="StopPodSandbox for \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\"" Dec 13 01:50:05.485326 env[1412]: time="2024-12-13T01:50:05.485205262Z" level=info msg="StopPodSandbox for \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\"" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.569 [INFO][4054] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.569 [INFO][4054] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" iface="eth0" netns="/var/run/netns/cni-f9c67d60-d20f-0b2e-252a-c4ae98c32740" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.569 [INFO][4054] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" iface="eth0" netns="/var/run/netns/cni-f9c67d60-d20f-0b2e-252a-c4ae98c32740" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.570 [INFO][4054] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" iface="eth0" netns="/var/run/netns/cni-f9c67d60-d20f-0b2e-252a-c4ae98c32740" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.570 [INFO][4054] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.570 [INFO][4054] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.603 [INFO][4066] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" HandleID="k8s-pod-network.ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.603 [INFO][4066] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.603 [INFO][4066] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.627 [WARNING][4066] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" HandleID="k8s-pod-network.ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.627 [INFO][4066] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" HandleID="k8s-pod-network.ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.629 [INFO][4066] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:05.635031 env[1412]: 2024-12-13 01:50:05.630 [INFO][4054] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:05.635031 env[1412]: time="2024-12-13T01:50:05.632990250Z" level=info msg="TearDown network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\" successfully" Dec 13 01:50:05.635031 env[1412]: time="2024-12-13T01:50:05.633030452Z" level=info msg="StopPodSandbox for \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\" returns successfully" Dec 13 01:50:05.638683 systemd[1]: run-netns-cni\x2df9c67d60\x2dd20f\x2d0b2e\x2d252a\x2dc4ae98c32740.mount: Deactivated successfully. Dec 13 01:50:05.640836 env[1412]: time="2024-12-13T01:50:05.640796777Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c87d4d589-x5jhp,Uid:d3874a66-1fc2-4d94-8282-e2b409f57d2c,Namespace:calico-apiserver,Attempt:1,}" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.563 [INFO][4047] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.564 [INFO][4047] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" iface="eth0" netns="/var/run/netns/cni-dd4a0a0a-f2c4-146d-441b-6933554dcf7d" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.564 [INFO][4047] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" iface="eth0" netns="/var/run/netns/cni-dd4a0a0a-f2c4-146d-441b-6933554dcf7d" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.564 [INFO][4047] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" iface="eth0" netns="/var/run/netns/cni-dd4a0a0a-f2c4-146d-441b-6933554dcf7d" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.564 [INFO][4047] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.564 [INFO][4047] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.622 [INFO][4065] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" HandleID="k8s-pod-network.43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.623 [INFO][4065] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.628 [INFO][4065] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.642 [WARNING][4065] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" HandleID="k8s-pod-network.43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.643 [INFO][4065] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" HandleID="k8s-pod-network.43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.644 [INFO][4065] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:05.647285 env[1412]: 2024-12-13 01:50:05.645 [INFO][4047] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:05.652478 systemd[1]: run-netns-cni\x2ddd4a0a0a\x2df2c4\x2d146d\x2d441b\x2d6933554dcf7d.mount: Deactivated successfully. Dec 13 01:50:05.655048 env[1412]: time="2024-12-13T01:50:05.655013055Z" level=info msg="TearDown network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\" successfully" Dec 13 01:50:05.655048 env[1412]: time="2024-12-13T01:50:05.655047757Z" level=info msg="StopPodSandbox for \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\" returns successfully" Dec 13 01:50:05.655878 env[1412]: time="2024-12-13T01:50:05.655791998Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-chq67,Uid:9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4,Namespace:kube-system,Attempt:1,}" Dec 13 01:50:05.853487 systemd-networkd[1565]: calia960e0a97cc: Link UP Dec 13 01:50:05.866115 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:50:05.866260 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calia960e0a97cc: link becomes ready Dec 13 01:50:05.869494 systemd-networkd[1565]: calia960e0a97cc: Gained carrier Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.752 [INFO][4077] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0 calico-apiserver-c87d4d589- calico-apiserver d3874a66-1fc2-4d94-8282-e2b409f57d2c 772 0 2024-12-13 01:49:34 +0000 UTC map[apiserver:true app.kubernetes.io/name:calico-apiserver k8s-app:calico-apiserver pod-template-hash:c87d4d589 projectcalico.org/namespace:calico-apiserver projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-apiserver] map[] [] [] []} {k8s ci-3510.3.6-a-92bad84337 calico-apiserver-c87d4d589-x5jhp eth0 calico-apiserver [] [] [kns.calico-apiserver ksa.calico-apiserver.calico-apiserver] calia960e0a97cc [] []}} ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-x5jhp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.752 [INFO][4077] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-x5jhp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.799 [INFO][4088] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" HandleID="k8s-pod-network.40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.814 [INFO][4088] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" HandleID="k8s-pod-network.40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc0003ba1e0), Attrs:map[string]string{"namespace":"calico-apiserver", "node":"ci-3510.3.6-a-92bad84337", "pod":"calico-apiserver-c87d4d589-x5jhp", "timestamp":"2024-12-13 01:50:05.799128942 +0000 UTC"}, Hostname:"ci-3510.3.6-a-92bad84337", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.814 [INFO][4088] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.814 [INFO][4088] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.814 [INFO][4088] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-92bad84337' Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.816 [INFO][4088] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.822 [INFO][4088] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.826 [INFO][4088] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.827 [INFO][4088] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.829 [INFO][4088] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.829 [INFO][4088] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.830 [INFO][4088] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7 Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.836 [INFO][4088] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.846 [INFO][4088] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.3/26] block=192.168.55.0/26 handle="k8s-pod-network.40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.846 [INFO][4088] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.3/26] handle="k8s-pod-network.40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.846 [INFO][4088] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:05.898578 env[1412]: 2024-12-13 01:50:05.846 [INFO][4088] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.3/26] IPv6=[] ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" HandleID="k8s-pod-network.40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.899245 env[1412]: 2024-12-13 01:50:05.848 [INFO][4077] cni-plugin/k8s.go 386: Populated endpoint ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-x5jhp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0", GenerateName:"calico-apiserver-c87d4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"d3874a66-1fc2-4d94-8282-e2b409f57d2c", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c87d4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"", Pod:"calico-apiserver-c87d4d589-x5jhp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.55.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia960e0a97cc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:05.899245 env[1412]: 2024-12-13 01:50:05.848 [INFO][4077] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.3/32] ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-x5jhp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.899245 env[1412]: 2024-12-13 01:50:05.849 [INFO][4077] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calia960e0a97cc ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-x5jhp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.899245 env[1412]: 2024-12-13 01:50:05.877 [INFO][4077] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-x5jhp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.899245 env[1412]: 2024-12-13 01:50:05.878 [INFO][4077] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-x5jhp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0", GenerateName:"calico-apiserver-c87d4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"d3874a66-1fc2-4d94-8282-e2b409f57d2c", ResourceVersion:"772", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c87d4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7", Pod:"calico-apiserver-c87d4d589-x5jhp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.55.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia960e0a97cc", MAC:"da:c9:32:7c:0d:0c", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:05.899245 env[1412]: 2024-12-13 01:50:05.896 [INFO][4077] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7" Namespace="calico-apiserver" Pod="calico-apiserver-c87d4d589-x5jhp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:05.916000 audit[4122]: NETFILTER_CFG table=filter:111 family=2 entries=44 op=nft_register_chain pid=4122 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:50:05.916000 audit[4122]: SYSCALL arch=c000003e syscall=46 success=yes exit=24368 a0=3 a1=7ffee56c30a0 a2=0 a3=7ffee56c308c items=0 ppid=3608 pid=4122 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:05.916000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:50:05.939109 env[1412]: time="2024-12-13T01:50:05.938985897Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:50:05.939109 env[1412]: time="2024-12-13T01:50:05.939034799Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:50:05.939109 env[1412]: time="2024-12-13T01:50:05.939057501Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:50:05.940525 env[1412]: time="2024-12-13T01:50:05.940481278Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7 pid=4134 runtime=io.containerd.runc.v2 Dec 13 01:50:05.968869 systemd-networkd[1565]: cali93d09f86e5c: Link UP Dec 13 01:50:05.979002 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): cali93d09f86e5c: link becomes ready Dec 13 01:50:05.979505 systemd-networkd[1565]: cali93d09f86e5c: Gained carrier Dec 13 01:50:05.981225 systemd[1]: Started cri-containerd-40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7.scope. Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.844 [INFO][4092] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0 coredns-6f6b679f8f- kube-system 9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4 771 0 2024-12-13 01:49:27 +0000 UTC map[k8s-app:kube-dns pod-template-hash:6f6b679f8f projectcalico.org/namespace:kube-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:coredns] map[] [] [] []} {k8s ci-3510.3.6-a-92bad84337 coredns-6f6b679f8f-chq67 eth0 coredns [] [] [kns.kube-system ksa.kube-system.coredns] cali93d09f86e5c [{dns UDP 53 0 } {dns-tcp TCP 53 0 } {metrics TCP 9153 0 }] []}} ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Namespace="kube-system" Pod="coredns-6f6b679f8f-chq67" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.845 [INFO][4092] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Namespace="kube-system" Pod="coredns-6f6b679f8f-chq67" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.913 [INFO][4109] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" HandleID="k8s-pod-network.6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.924 [INFO][4109] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" HandleID="k8s-pod-network.6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000318c30), Attrs:map[string]string{"namespace":"kube-system", "node":"ci-3510.3.6-a-92bad84337", "pod":"coredns-6f6b679f8f-chq67", "timestamp":"2024-12-13 01:50:05.913452099 +0000 UTC"}, Hostname:"ci-3510.3.6-a-92bad84337", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.924 [INFO][4109] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.924 [INFO][4109] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.924 [INFO][4109] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-92bad84337' Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.926 [INFO][4109] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.930 [INFO][4109] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.934 [INFO][4109] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.935 [INFO][4109] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.938 [INFO][4109] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.938 [INFO][4109] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.939 [INFO][4109] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.945 [INFO][4109] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.957 [INFO][4109] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.4/26] block=192.168.55.0/26 handle="k8s-pod-network.6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.957 [INFO][4109] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.4/26] handle="k8s-pod-network.6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.957 [INFO][4109] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:05.997850 env[1412]: 2024-12-13 01:50:05.957 [INFO][4109] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.4/26] IPv6=[] ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" HandleID="k8s-pod-network.6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:05.998746 env[1412]: 2024-12-13 01:50:05.959 [INFO][4092] cni-plugin/k8s.go 386: Populated endpoint ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Namespace="kube-system" Pod="coredns-6f6b679f8f-chq67" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"", Pod:"coredns-6f6b679f8f-chq67", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.55.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali93d09f86e5c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:05.998746 env[1412]: 2024-12-13 01:50:05.959 [INFO][4092] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.4/32] ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Namespace="kube-system" Pod="coredns-6f6b679f8f-chq67" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:05.998746 env[1412]: 2024-12-13 01:50:05.959 [INFO][4092] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to cali93d09f86e5c ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Namespace="kube-system" Pod="coredns-6f6b679f8f-chq67" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:05.998746 env[1412]: 2024-12-13 01:50:05.979 [INFO][4092] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Namespace="kube-system" Pod="coredns-6f6b679f8f-chq67" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:05.998746 env[1412]: 2024-12-13 01:50:05.979 [INFO][4092] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Namespace="kube-system" Pod="coredns-6f6b679f8f-chq67" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4", ResourceVersion:"771", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab", Pod:"coredns-6f6b679f8f-chq67", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.55.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali93d09f86e5c", MAC:"5a:46:d5:c2:a6:32", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:05.998746 env[1412]: 2024-12-13 01:50:05.996 [INFO][4092] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab" Namespace="kube-system" Pod="coredns-6f6b679f8f-chq67" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:06.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.014000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.014000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.015000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.015000 audit: BPF prog-id=174 op=LOAD Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4134 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653265386436336236336339636639656263626439666432343733 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=c items=0 ppid=4134 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653265386436336236336339636639656263626439666432343733 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit: BPF prog-id=175 op=LOAD Dec 13 01:50:06.016000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c000218fd0 items=0 ppid=4134 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653265386436336236336339636639656263626439666432343733 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit: BPF prog-id=176 op=LOAD Dec 13 01:50:06.016000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c000219018 items=0 ppid=4134 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653265386436336236336339636639656263626439666432343733 Dec 13 01:50:06.016000 audit: BPF prog-id=176 op=UNLOAD Dec 13 01:50:06.016000 audit: BPF prog-id=175 op=UNLOAD Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { perfmon } for pid=4144 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit[4144]: AVC avc: denied { bpf } for pid=4144 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.016000 audit: BPF prog-id=177 op=LOAD Dec 13 01:50:06.016000 audit[4144]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c000219428 items=0 ppid=4134 pid=4144 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.016000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3430653265386436336236336339636639656263626439666432343733 Dec 13 01:50:06.031215 env[1412]: time="2024-12-13T01:50:06.031158223Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:50:06.031379 env[1412]: time="2024-12-13T01:50:06.031237127Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:50:06.031379 env[1412]: time="2024-12-13T01:50:06.031268329Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:50:06.031590 env[1412]: time="2024-12-13T01:50:06.031530443Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab pid=4181 runtime=io.containerd.runc.v2 Dec 13 01:50:06.040000 audit[4177]: NETFILTER_CFG table=filter:112 family=2 entries=34 op=nft_register_chain pid=4177 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:50:06.040000 audit[4177]: SYSCALL arch=c000003e syscall=46 success=yes exit=18204 a0=3 a1=7ffde5d39bd0 a2=0 a3=7ffde5d39bbc items=0 ppid=3608 pid=4177 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.040000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:50:06.065665 systemd[1]: Started cri-containerd-6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab.scope. Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.079000 audit: BPF prog-id=178 op=LOAD Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4181 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303165353735396236323930323230653637633331373164343833 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=c items=0 ppid=4181 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303165353735396236323930323230653637633331373164343833 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.080000 audit: BPF prog-id=179 op=LOAD Dec 13 01:50:06.080000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000309040 items=0 ppid=4181 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.080000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303165353735396236323930323230653637633331373164343833 Dec 13 01:50:06.081000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.081000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.081000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.081000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.081000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.081000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.081000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.081000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.081000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.081000 audit: BPF prog-id=180 op=LOAD Dec 13 01:50:06.081000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000309088 items=0 ppid=4181 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.081000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303165353735396236323930323230653637633331373164343833 Dec 13 01:50:06.082000 audit: BPF prog-id=180 op=UNLOAD Dec 13 01:50:06.082000 audit: BPF prog-id=179 op=UNLOAD Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { perfmon } for pid=4191 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit[4191]: AVC avc: denied { bpf } for pid=4191 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.082000 audit: BPF prog-id=181 op=LOAD Dec 13 01:50:06.082000 audit[4191]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000309498 items=0 ppid=4181 pid=4191 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.082000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3664303165353735396236323930323230653637633331373164343833 Dec 13 01:50:06.105878 env[1412]: time="2024-12-13T01:50:06.105757260Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-apiserver-c87d4d589-x5jhp,Uid:d3874a66-1fc2-4d94-8282-e2b409f57d2c,Namespace:calico-apiserver,Attempt:1,} returns sandbox id \"40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7\"" Dec 13 01:50:06.133977 env[1412]: time="2024-12-13T01:50:06.133940185Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:coredns-6f6b679f8f-chq67,Uid:9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4,Namespace:kube-system,Attempt:1,} returns sandbox id \"6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab\"" Dec 13 01:50:06.136381 env[1412]: time="2024-12-13T01:50:06.136341615Z" level=info msg="CreateContainer within sandbox \"6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab\" for container &ContainerMetadata{Name:coredns,Attempt:0,}" Dec 13 01:50:06.164921 env[1412]: time="2024-12-13T01:50:06.164857258Z" level=info msg="CreateContainer within sandbox \"6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab\" for &ContainerMetadata{Name:coredns,Attempt:0,} returns container id \"a954d759d7056a5ea4b5a66e664971dd628b8e724521f2258c1075c119739340\"" Dec 13 01:50:06.165663 env[1412]: time="2024-12-13T01:50:06.165626100Z" level=info msg="StartContainer for \"a954d759d7056a5ea4b5a66e664971dd628b8e724521f2258c1075c119739340\"" Dec 13 01:50:06.183859 systemd[1]: Started cri-containerd-a954d759d7056a5ea4b5a66e664971dd628b8e724521f2258c1075c119739340.scope. Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.198000 audit: BPF prog-id=182 op=LOAD Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4181 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353464373539643730353661356561346235613636653636343937 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=8 items=0 ppid=4181 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353464373539643730353661356561346235613636653636343937 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit: BPF prog-id=183 op=LOAD Dec 13 01:50:06.199000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002016a0 items=0 ppid=4181 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353464373539643730353661356561346235613636653636343937 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit: BPF prog-id=184 op=LOAD Dec 13 01:50:06.199000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c0002016e8 items=0 ppid=4181 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353464373539643730353661356561346235613636653636343937 Dec 13 01:50:06.199000 audit: BPF prog-id=184 op=UNLOAD Dec 13 01:50:06.199000 audit: BPF prog-id=183 op=UNLOAD Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { perfmon } for pid=4227 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit[4227]: AVC avc: denied { bpf } for pid=4227 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:06.199000 audit: BPF prog-id=185 op=LOAD Dec 13 01:50:06.199000 audit[4227]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000201af8 items=0 ppid=4181 pid=4227 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.199000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6139353464373539643730353661356561346235613636653636343937 Dec 13 01:50:06.218301 env[1412]: time="2024-12-13T01:50:06.218259848Z" level=info msg="StartContainer for \"a954d759d7056a5ea4b5a66e664971dd628b8e724521f2258c1075c119739340\" returns successfully" Dec 13 01:50:06.324693 systemd-networkd[1565]: calif91c9a0c2da: Gained IPv6LL Dec 13 01:50:06.484898 env[1412]: time="2024-12-13T01:50:06.484639864Z" level=info msg="StopPodSandbox for \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\"" Dec 13 01:50:06.488324 env[1412]: time="2024-12-13T01:50:06.487437916Z" level=info msg="StopPodSandbox for \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\"" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.600 [INFO][4285] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.600 [INFO][4285] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" iface="eth0" netns="/var/run/netns/cni-62656ee8-119d-714f-3ca4-5d10d5fc24d6" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.600 [INFO][4285] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" iface="eth0" netns="/var/run/netns/cni-62656ee8-119d-714f-3ca4-5d10d5fc24d6" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.601 [INFO][4285] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" iface="eth0" netns="/var/run/netns/cni-62656ee8-119d-714f-3ca4-5d10d5fc24d6" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.601 [INFO][4285] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.601 [INFO][4285] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.670 [INFO][4307] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" HandleID="k8s-pod-network.9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.671 [INFO][4307] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.671 [INFO][4307] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.681 [WARNING][4307] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" HandleID="k8s-pod-network.9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.681 [INFO][4307] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" HandleID="k8s-pod-network.9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.683 [INFO][4307] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:06.693961 env[1412]: 2024-12-13 01:50:06.692 [INFO][4285] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:06.698889 systemd[1]: run-netns-cni\x2d62656ee8\x2d119d\x2d714f\x2d3ca4\x2d5d10d5fc24d6.mount: Deactivated successfully. Dec 13 01:50:06.701611 env[1412]: time="2024-12-13T01:50:06.699636400Z" level=info msg="TearDown network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\" successfully" Dec 13 01:50:06.701611 env[1412]: time="2024-12-13T01:50:06.699676502Z" level=info msg="StopPodSandbox for \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\" returns successfully" Dec 13 01:50:06.701611 env[1412]: time="2024-12-13T01:50:06.700759960Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t2mmp,Uid:dee8dd51-2759-489b-acfd-de00febc629a,Namespace:calico-system,Attempt:1,}" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.575 [INFO][4295] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.575 [INFO][4295] cni-plugin/dataplane_linux.go 559: Deleting workload's device in netns. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" iface="eth0" netns="/var/run/netns/cni-21ccaa53-faef-d7b2-eed5-e7aa8c05f195" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.575 [INFO][4295] cni-plugin/dataplane_linux.go 570: Entered netns, deleting veth. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" iface="eth0" netns="/var/run/netns/cni-21ccaa53-faef-d7b2-eed5-e7aa8c05f195" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.576 [INFO][4295] cni-plugin/dataplane_linux.go 597: Workload's veth was already gone. Nothing to do. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" iface="eth0" netns="/var/run/netns/cni-21ccaa53-faef-d7b2-eed5-e7aa8c05f195" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.576 [INFO][4295] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.576 [INFO][4295] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.673 [INFO][4303] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" HandleID="k8s-pod-network.fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.673 [INFO][4303] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.683 [INFO][4303] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.694 [WARNING][4303] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" HandleID="k8s-pod-network.fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.694 [INFO][4303] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" HandleID="k8s-pod-network.fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.702 [INFO][4303] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:06.706672 env[1412]: 2024-12-13 01:50:06.704 [INFO][4295] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:06.714694 systemd[1]: run-netns-cni\x2d21ccaa53\x2dfaef\x2dd7b2\x2deed5\x2de7aa8c05f195.mount: Deactivated successfully. Dec 13 01:50:06.716689 env[1412]: time="2024-12-13T01:50:06.716646720Z" level=info msg="TearDown network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\" successfully" Dec 13 01:50:06.716813 env[1412]: time="2024-12-13T01:50:06.716796128Z" level=info msg="StopPodSandbox for \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\" returns successfully" Dec 13 01:50:06.718100 env[1412]: time="2024-12-13T01:50:06.718069997Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-955cfb777-kkbj7,Uid:3b2e20c2-5f0a-4735-afcc-b2f438a0615b,Namespace:calico-system,Attempt:1,}" Dec 13 01:50:06.741142 kubelet[2444]: I1213 01:50:06.738456 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="kube-system/coredns-6f6b679f8f-chq67" podStartSLOduration=39.738435299 podStartE2EDuration="39.738435299s" podCreationTimestamp="2024-12-13 01:49:27 +0000 UTC" firstStartedPulling="0001-01-01 00:00:00 +0000 UTC" lastFinishedPulling="0001-01-01 00:00:00 +0000 UTC" observedRunningTime="2024-12-13 01:50:06.734597392 +0000 UTC m=+44.358636367" watchObservedRunningTime="2024-12-13 01:50:06.738435299 +0000 UTC m=+44.362474274" Dec 13 01:50:06.891000 audit[4336]: NETFILTER_CFG table=filter:113 family=2 entries=10 op=nft_register_rule pid=4336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:06.891000 audit[4336]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fffcfd13ab0 a2=0 a3=7fffcfd13a9c items=0 ppid=2621 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.891000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:06.898000 audit[4336]: NETFILTER_CFG table=nat:114 family=2 entries=44 op=nft_register_rule pid=4336 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:06.898000 audit[4336]: SYSCALL arch=c000003e syscall=46 success=yes exit=14196 a0=3 a1=7fffcfd13ab0 a2=0 a3=7fffcfd13a9c items=0 ppid=2621 pid=4336 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:06.898000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:07.092111 systemd-networkd[1565]: calia960e0a97cc: Gained IPv6LL Dec 13 01:50:07.107000 audit[4353]: NETFILTER_CFG table=filter:115 family=2 entries=10 op=nft_register_rule pid=4353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:07.107000 audit[4353]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffeaaa0f3a0 a2=0 a3=7ffeaaa0f38c items=0 ppid=2621 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.107000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:07.126000 audit[4353]: NETFILTER_CFG table=nat:116 family=2 entries=56 op=nft_register_chain pid=4353 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:07.126000 audit[4353]: SYSCALL arch=c000003e syscall=46 success=yes exit=19860 a0=3 a1=7ffeaaa0f3a0 a2=0 a3=7ffeaaa0f38c items=0 ppid=2621 pid=4353 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.126000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:07.173690 systemd-networkd[1565]: calic1878784717: Link UP Dec 13 01:50:07.182254 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): eth0: link becomes ready Dec 13 01:50:07.182346 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calic1878784717: link becomes ready Dec 13 01:50:07.188707 systemd-networkd[1565]: calic1878784717: Gained carrier Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:06.950 [INFO][4315] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0 calico-kube-controllers-955cfb777- calico-system 3b2e20c2-5f0a-4735-afcc-b2f438a0615b 786 0 2024-12-13 01:49:35 +0000 UTC map[app.kubernetes.io/name:calico-kube-controllers k8s-app:calico-kube-controllers pod-template-hash:955cfb777 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:calico-kube-controllers] map[] [] [] []} {k8s ci-3510.3.6-a-92bad84337 calico-kube-controllers-955cfb777-kkbj7 eth0 calico-kube-controllers [] [] [kns.calico-system ksa.calico-system.calico-kube-controllers] calic1878784717 [] []}} ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Namespace="calico-system" Pod="calico-kube-controllers-955cfb777-kkbj7" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:06.950 [INFO][4315] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Namespace="calico-system" Pod="calico-kube-controllers-955cfb777-kkbj7" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.091 [INFO][4342] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" HandleID="k8s-pod-network.635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.119 [INFO][4342] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" HandleID="k8s-pod-network.635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000310e10), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-92bad84337", "pod":"calico-kube-controllers-955cfb777-kkbj7", "timestamp":"2024-12-13 01:50:07.091234239 +0000 UTC"}, Hostname:"ci-3510.3.6-a-92bad84337", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.120 [INFO][4342] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.120 [INFO][4342] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.120 [INFO][4342] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-92bad84337' Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.123 [INFO][4342] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.131 [INFO][4342] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.139 [INFO][4342] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.141 [INFO][4342] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.145 [INFO][4342] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.146 [INFO][4342] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.148 [INFO][4342] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.154 [INFO][4342] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.166 [INFO][4342] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.5/26] block=192.168.55.0/26 handle="k8s-pod-network.635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.166 [INFO][4342] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.5/26] handle="k8s-pod-network.635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.166 [INFO][4342] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:07.201552 env[1412]: 2024-12-13 01:50:07.166 [INFO][4342] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.5/26] IPv6=[] ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" HandleID="k8s-pod-network.635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:07.202494 env[1412]: 2024-12-13 01:50:07.168 [INFO][4315] cni-plugin/k8s.go 386: Populated endpoint ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Namespace="calico-system" Pod="calico-kube-controllers-955cfb777-kkbj7" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0", GenerateName:"calico-kube-controllers-955cfb777-", Namespace:"calico-system", SelfLink:"", UID:"3b2e20c2-5f0a-4735-afcc-b2f438a0615b", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"955cfb777", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"", Pod:"calico-kube-controllers-955cfb777-kkbj7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.55.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic1878784717", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:07.202494 env[1412]: 2024-12-13 01:50:07.168 [INFO][4315] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.5/32] ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Namespace="calico-system" Pod="calico-kube-controllers-955cfb777-kkbj7" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:07.202494 env[1412]: 2024-12-13 01:50:07.168 [INFO][4315] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calic1878784717 ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Namespace="calico-system" Pod="calico-kube-controllers-955cfb777-kkbj7" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:07.202494 env[1412]: 2024-12-13 01:50:07.188 [INFO][4315] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Namespace="calico-system" Pod="calico-kube-controllers-955cfb777-kkbj7" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:07.202494 env[1412]: 2024-12-13 01:50:07.189 [INFO][4315] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Namespace="calico-system" Pod="calico-kube-controllers-955cfb777-kkbj7" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0", GenerateName:"calico-kube-controllers-955cfb777-", Namespace:"calico-system", SelfLink:"", UID:"3b2e20c2-5f0a-4735-afcc-b2f438a0615b", ResourceVersion:"786", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"955cfb777", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe", Pod:"calico-kube-controllers-955cfb777-kkbj7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.55.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic1878784717", MAC:"a6:ac:3a:82:e6:36", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:07.202494 env[1412]: 2024-12-13 01:50:07.200 [INFO][4315] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe" Namespace="calico-system" Pod="calico-kube-controllers-955cfb777-kkbj7" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:07.237000 audit[4368]: NETFILTER_CFG table=filter:117 family=2 entries=46 op=nft_register_chain pid=4368 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:50:07.237000 audit[4368]: SYSCALL arch=c000003e syscall=46 success=yes exit=22696 a0=3 a1=7ffc367ad280 a2=0 a3=7ffc367ad26c items=0 ppid=3608 pid=4368 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.237000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:50:07.286774 systemd-networkd[1565]: calibfc28a6e1eb: Link UP Dec 13 01:50:07.287006 kernel: IPv6: ADDRCONF(NETDEV_CHANGE): calibfc28a6e1eb: link becomes ready Dec 13 01:50:07.287114 systemd-networkd[1565]: calibfc28a6e1eb: Gained carrier Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:06.960 [INFO][4321] cni-plugin/plugin.go 325: Calico CNI found existing endpoint: &{{WorkloadEndpoint projectcalico.org/v3} {ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0 csi-node-driver- calico-system dee8dd51-2759-489b-acfd-de00febc629a 789 0 2024-12-13 01:49:35 +0000 UTC map[app.kubernetes.io/name:csi-node-driver controller-revision-hash:56747c9949 k8s-app:csi-node-driver name:csi-node-driver pod-template-generation:1 projectcalico.org/namespace:calico-system projectcalico.org/orchestrator:k8s projectcalico.org/serviceaccount:csi-node-driver] map[] [] [] []} {k8s ci-3510.3.6-a-92bad84337 csi-node-driver-t2mmp eth0 csi-node-driver [] [] [kns.calico-system ksa.calico-system.csi-node-driver] calibfc28a6e1eb [] []}} ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Namespace="calico-system" Pod="csi-node-driver-t2mmp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:06.960 [INFO][4321] cni-plugin/k8s.go 77: Extracted identifiers for CmdAddK8s ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Namespace="calico-system" Pod="csi-node-driver-t2mmp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.090 [INFO][4343] ipam/ipam_plugin.go 225: Calico CNI IPAM request count IPv4=1 IPv6=0 ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" HandleID="k8s-pod-network.251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.121 [INFO][4343] ipam/ipam_plugin.go 265: Auto assigning IP ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" HandleID="k8s-pod-network.251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" assignArgs=ipam.AutoAssignArgs{Num4:1, Num6:0, HandleID:(*string)(0xc000291d20), Attrs:map[string]string{"namespace":"calico-system", "node":"ci-3510.3.6-a-92bad84337", "pod":"csi-node-driver-t2mmp", "timestamp":"2024-12-13 01:50:07.090107878 +0000 UTC"}, Hostname:"ci-3510.3.6-a-92bad84337", IPv4Pools:[]net.IPNet{}, IPv6Pools:[]net.IPNet{}, MaxBlocksPerHost:0, HostReservedAttrIPv4s:(*ipam.HostReservedAttr)(nil), HostReservedAttrIPv6s:(*ipam.HostReservedAttr)(nil), IntendedUse:"Workload"} Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.121 [INFO][4343] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.166 [INFO][4343] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.166 [INFO][4343] ipam/ipam.go 107: Auto-assign 1 ipv4, 0 ipv6 addrs for host 'ci-3510.3.6-a-92bad84337' Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.226 [INFO][4343] ipam/ipam.go 660: Looking up existing affinities for host handle="k8s-pod-network.251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.230 [INFO][4343] ipam/ipam.go 372: Looking up existing affinities for host host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.244 [INFO][4343] ipam/ipam.go 489: Trying affinity for 192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.246 [INFO][4343] ipam/ipam.go 155: Attempting to load block cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.248 [INFO][4343] ipam/ipam.go 232: Affinity is confirmed and block has been loaded cidr=192.168.55.0/26 host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.248 [INFO][4343] ipam/ipam.go 1180: Attempting to assign 1 addresses from block block=192.168.55.0/26 handle="k8s-pod-network.251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.251 [INFO][4343] ipam/ipam.go 1685: Creating new handle: k8s-pod-network.251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.256 [INFO][4343] ipam/ipam.go 1203: Writing block in order to claim IPs block=192.168.55.0/26 handle="k8s-pod-network.251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.266 [INFO][4343] ipam/ipam.go 1216: Successfully claimed IPs: [192.168.55.6/26] block=192.168.55.0/26 handle="k8s-pod-network.251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.266 [INFO][4343] ipam/ipam.go 847: Auto-assigned 1 out of 1 IPv4s: [192.168.55.6/26] handle="k8s-pod-network.251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" host="ci-3510.3.6-a-92bad84337" Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.266 [INFO][4343] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:07.297189 env[1412]: 2024-12-13 01:50:07.266 [INFO][4343] ipam/ipam_plugin.go 283: Calico CNI IPAM assigned addresses IPv4=[192.168.55.6/26] IPv6=[] ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" HandleID="k8s-pod-network.251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:07.298127 env[1412]: 2024-12-13 01:50:07.268 [INFO][4321] cni-plugin/k8s.go 386: Populated endpoint ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Namespace="calico-system" Pod="csi-node-driver-t2mmp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dee8dd51-2759-489b-acfd-de00febc629a", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"", Pod:"csi-node-driver-t2mmp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibfc28a6e1eb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:07.298127 env[1412]: 2024-12-13 01:50:07.268 [INFO][4321] cni-plugin/k8s.go 387: Calico CNI using IPs: [192.168.55.6/32] ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Namespace="calico-system" Pod="csi-node-driver-t2mmp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:07.298127 env[1412]: 2024-12-13 01:50:07.268 [INFO][4321] cni-plugin/dataplane_linux.go 69: Setting the host side veth name to calibfc28a6e1eb ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Namespace="calico-system" Pod="csi-node-driver-t2mmp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:07.298127 env[1412]: 2024-12-13 01:50:07.280 [INFO][4321] cni-plugin/dataplane_linux.go 508: Disabling IPv4 forwarding ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Namespace="calico-system" Pod="csi-node-driver-t2mmp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:07.298127 env[1412]: 2024-12-13 01:50:07.280 [INFO][4321] cni-plugin/k8s.go 414: Added Mac, interface name, and active container ID to endpoint ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Namespace="calico-system" Pod="csi-node-driver-t2mmp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" endpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dee8dd51-2759-489b-acfd-de00febc629a", ResourceVersion:"789", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce", Pod:"csi-node-driver-t2mmp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibfc28a6e1eb", MAC:"3a:df:01:55:43:f7", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:07.298127 env[1412]: 2024-12-13 01:50:07.295 [INFO][4321] cni-plugin/k8s.go 500: Wrote updated endpoint to datastore ContainerID="251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce" Namespace="calico-system" Pod="csi-node-driver-t2mmp" WorkloadEndpoint="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:07.314000 audit[4380]: NETFILTER_CFG table=filter:118 family=2 entries=46 op=nft_register_chain pid=4380 subj=system_u:system_r:kernel_t:s0 comm="iptables-nft-re" Dec 13 01:50:07.314000 audit[4380]: SYSCALL arch=c000003e syscall=46 success=yes exit=22188 a0=3 a1=7ffd79818ba0 a2=0 a3=7ffd79818b8c items=0 ppid=3608 pid=4380 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-nft-re" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.314000 audit: PROCTITLE proctitle=69707461626C65732D6E66742D726573746F7265002D2D6E6F666C757368002D2D766572626F7365002D2D77616974003130002D2D776169742D696E74657276616C003530303030 Dec 13 01:50:07.464605 env[1412]: time="2024-12-13T01:50:07.462081389Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:50:07.464605 env[1412]: time="2024-12-13T01:50:07.462110790Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:50:07.464605 env[1412]: time="2024-12-13T01:50:07.462124291Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:50:07.464605 env[1412]: time="2024-12-13T01:50:07.462255598Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce pid=4403 runtime=io.containerd.runc.v2 Dec 13 01:50:07.465013 env[1412]: time="2024-12-13T01:50:07.459022225Z" level=info msg="loading plugin \"io.containerd.event.v1.publisher\"..." runtime=io.containerd.runc.v2 type=io.containerd.event.v1 Dec 13 01:50:07.465013 env[1412]: time="2024-12-13T01:50:07.459074528Z" level=info msg="loading plugin \"io.containerd.internal.v1.shutdown\"..." runtime=io.containerd.runc.v2 type=io.containerd.internal.v1 Dec 13 01:50:07.465013 env[1412]: time="2024-12-13T01:50:07.459089029Z" level=info msg="loading plugin \"io.containerd.ttrpc.v1.task\"..." runtime=io.containerd.runc.v2 type=io.containerd.ttrpc.v1 Dec 13 01:50:07.465013 env[1412]: time="2024-12-13T01:50:07.459220736Z" level=info msg="starting signal loop" namespace=k8s.io path=/run/containerd/io.containerd.runtime.v2.task/k8s.io/635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe pid=4389 runtime=io.containerd.runc.v2 Dec 13 01:50:07.494392 systemd[1]: Started cri-containerd-635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe.scope. Dec 13 01:50:07.508262 systemd[1]: Started cri-containerd-251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce.scope. Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.523000 audit: BPF prog-id=186 op=LOAD Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000197c48 a2=10 a3=1c items=0 ppid=4389 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356361333739383266623336373737386631316266363033303761 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001976b0 a2=3c a3=c items=0 ppid=4389 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356361333739383266623336373737386631316266363033303761 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit: BPF prog-id=187 op=LOAD Dec 13 01:50:07.524000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001979d8 a2=78 a3=c0002125f0 items=0 ppid=4389 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356361333739383266623336373737386631316266363033303761 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit: BPF prog-id=188 op=LOAD Dec 13 01:50:07.524000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000197770 a2=78 a3=c000212638 items=0 ppid=4389 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356361333739383266623336373737386631316266363033303761 Dec 13 01:50:07.524000 audit: BPF prog-id=188 op=UNLOAD Dec 13 01:50:07.524000 audit: BPF prog-id=187 op=UNLOAD Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { perfmon } for pid=4416 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit[4416]: AVC avc: denied { bpf } for pid=4416 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.524000 audit: BPF prog-id=189 op=LOAD Dec 13 01:50:07.524000 audit[4416]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000197c30 a2=78 a3=c000212a48 items=0 ppid=4389 pid=4416 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.524000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3633356361333739383266623336373737386631316266363033303761 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.554000 audit: BPF prog-id=190 op=LOAD Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c00014dc48 a2=10 a3=1c items=0 ppid=4403 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235316263653531636533363630643134336663373136626234386633 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c00014d6b0 a2=3c a3=c items=0 ppid=4403 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235316263653531636533363630643134336663373136626234386633 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit: BPF prog-id=191 op=LOAD Dec 13 01:50:07.555000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014d9d8 a2=78 a3=c000296450 items=0 ppid=4403 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235316263653531636533363630643134336663373136626234386633 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit: BPF prog-id=192 op=LOAD Dec 13 01:50:07.555000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c00014d770 a2=78 a3=c000296498 items=0 ppid=4403 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235316263653531636533363630643134336663373136626234386633 Dec 13 01:50:07.555000 audit: BPF prog-id=192 op=UNLOAD Dec 13 01:50:07.555000 audit: BPF prog-id=191 op=UNLOAD Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { perfmon } for pid=4415 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit[4415]: AVC avc: denied { bpf } for pid=4415 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:07.555000 audit: BPF prog-id=193 op=LOAD Dec 13 01:50:07.555000 audit[4415]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c00014dc30 a2=78 a3=c0002968a8 items=0 ppid=4403 pid=4415 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:07.555000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3235316263653531636533363630643134336663373136626234386633 Dec 13 01:50:07.570976 env[1412]: time="2024-12-13T01:50:07.570930715Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:csi-node-driver-t2mmp,Uid:dee8dd51-2759-489b-acfd-de00febc629a,Namespace:calico-system,Attempt:1,} returns sandbox id \"251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce\"" Dec 13 01:50:07.608781 env[1412]: time="2024-12-13T01:50:07.608735939Z" level=info msg="RunPodSandbox for &PodSandboxMetadata{Name:calico-kube-controllers-955cfb777-kkbj7,Uid:3b2e20c2-5f0a-4735-afcc-b2f438a0615b,Namespace:calico-system,Attempt:1,} returns sandbox id \"635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe\"" Dec 13 01:50:07.924814 systemd-networkd[1565]: cali93d09f86e5c: Gained IPv6LL Dec 13 01:50:08.436163 systemd-networkd[1565]: calibfc28a6e1eb: Gained IPv6LL Dec 13 01:50:08.586152 env[1412]: time="2024-12-13T01:50:08.586101218Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:08.592509 env[1412]: time="2024-12-13T01:50:08.592463555Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:08.608585 env[1412]: time="2024-12-13T01:50:08.608544406Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:08.617010 env[1412]: time="2024-12-13T01:50:08.616969953Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:08.617799 env[1412]: time="2024-12-13T01:50:08.617756594Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 01:50:08.620486 env[1412]: time="2024-12-13T01:50:08.620451037Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\"" Dec 13 01:50:08.621872 env[1412]: time="2024-12-13T01:50:08.621830910Z" level=info msg="CreateContainer within sandbox \"2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 01:50:08.653616 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount1713103505.mount: Deactivated successfully. Dec 13 01:50:08.666125 env[1412]: time="2024-12-13T01:50:08.666080953Z" level=info msg="CreateContainer within sandbox \"2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"df65b5947294cee3d3291061687182387dfd7b7e60d50ebb34b8817499c4f34a\"" Dec 13 01:50:08.668201 env[1412]: time="2024-12-13T01:50:08.666766589Z" level=info msg="StartContainer for \"df65b5947294cee3d3291061687182387dfd7b7e60d50ebb34b8817499c4f34a\"" Dec 13 01:50:08.697668 systemd[1]: Started cri-containerd-df65b5947294cee3d3291061687182387dfd7b7e60d50ebb34b8817499c4f34a.scope. Dec 13 01:50:08.726816 kernel: kauditd_printk_skb: 488 callbacks suppressed Dec 13 01:50:08.726982 kernel: audit: type=1400 audit(1734054608.708:1293): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.755189 kernel: audit: type=1400 audit(1734054608.708:1294): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.755280 kernel: audit: type=1400 audit(1734054608.708:1295): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.755738 kernel: audit: type=1400 audit(1734054608.708:1296): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.785492 kernel: audit: type=1400 audit(1734054608.708:1297): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.798996 kernel: audit: type=1400 audit(1734054608.708:1298): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.813344 kernel: audit: type=1400 audit(1734054608.708:1299): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.708000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.840531 kernel: audit: type=1400 audit(1734054608.708:1300): avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.840616 kernel: audit: type=1400 audit(1734054608.708:1301): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.708000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.840861 env[1412]: time="2024-12-13T01:50:08.840798705Z" level=info msg="StartContainer for \"df65b5947294cee3d3291061687182387dfd7b7e60d50ebb34b8817499c4f34a\" returns successfully" Dec 13 01:50:08.726000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit: BPF prog-id=194 op=LOAD Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.860928 kernel: audit: type=1400 audit(1734054608.726:1302): avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c0001bdc48 a2=10 a3=1c items=0 ppid=3984 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:08.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466363562353934373239346365653364333239313036313638373138 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001bd6b0 a2=3c a3=8 items=0 ppid=3984 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:08.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466363562353934373239346365653364333239313036313638373138 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.726000 audit: BPF prog-id=195 op=LOAD Dec 13 01:50:08.726000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bd9d8 a2=78 a3=c0000a4fc0 items=0 ppid=3984 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:08.726000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466363562353934373239346365653364333239313036313638373138 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit: BPF prog-id=196 op=LOAD Dec 13 01:50:08.727000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c0001bd770 a2=78 a3=c0000a5008 items=0 ppid=3984 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:08.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466363562353934373239346365653364333239313036313638373138 Dec 13 01:50:08.727000 audit: BPF prog-id=196 op=UNLOAD Dec 13 01:50:08.727000 audit: BPF prog-id=195 op=UNLOAD Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { perfmon } for pid=4473 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit[4473]: AVC avc: denied { bpf } for pid=4473 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:08.727000 audit: BPF prog-id=197 op=LOAD Dec 13 01:50:08.727000 audit[4473]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001bdc30 a2=78 a3=c0000a5418 items=0 ppid=3984 pid=4473 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:08.727000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F6466363562353934373239346365653364333239313036313638373138 Dec 13 01:50:08.884079 systemd-networkd[1565]: calic1878784717: Gained IPv6LL Dec 13 01:50:08.987244 env[1412]: time="2024-12-13T01:50:08.987133254Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:08.993873 env[1412]: time="2024-12-13T01:50:08.993827608Z" level=info msg="ImageUpdate event &ImageUpdate{Name:sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:08.998788 env[1412]: time="2024-12-13T01:50:08.998755069Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:09.003758 env[1412]: time="2024-12-13T01:50:09.003724231Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/apiserver@sha256:b8c43e264fe52e0c327b0bf3ac882a0224b33bdd7f4ff58a74242da7d9b00486,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:09.005089 env[1412]: time="2024-12-13T01:50:09.005053300Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/apiserver:v3.29.1\" returns image reference \"sha256:421726ace5ed13894f7edf594dd3a462947aedc13d0f69d08525d7369477fb70\"" Dec 13 01:50:09.008134 env[1412]: time="2024-12-13T01:50:09.008105860Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\"" Dec 13 01:50:09.009046 env[1412]: time="2024-12-13T01:50:09.009014108Z" level=info msg="CreateContainer within sandbox \"40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7\" for container &ContainerMetadata{Name:calico-apiserver,Attempt:0,}" Dec 13 01:50:09.044002 env[1412]: time="2024-12-13T01:50:09.043967740Z" level=info msg="CreateContainer within sandbox \"40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7\" for &ContainerMetadata{Name:calico-apiserver,Attempt:0,} returns container id \"292e95f73e075edc853a897b7a407f0862ead95efe5b90d52dc4e7580e095870\"" Dec 13 01:50:09.044633 env[1412]: time="2024-12-13T01:50:09.044605573Z" level=info msg="StartContainer for \"292e95f73e075edc853a897b7a407f0862ead95efe5b90d52dc4e7580e095870\"" Dec 13 01:50:09.064207 systemd[1]: Started cri-containerd-292e95f73e075edc853a897b7a407f0862ead95efe5b90d52dc4e7580e095870.scope. Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.086000 audit: BPF prog-id=198 op=LOAD Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000145c48 a2=10 a3=1c items=0 ppid=4134 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:09.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326539356637336530373565646338353361383937623761343037 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001456b0 a2=3c a3=8 items=0 ppid=4134 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:09.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326539356637336530373565646338353361383937623761343037 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit: BPF prog-id=199 op=LOAD Dec 13 01:50:09.087000 audit[4511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001459d8 a2=78 a3=c0003c3b90 items=0 ppid=4134 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:09.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326539356637336530373565646338353361383937623761343037 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit: BPF prog-id=200 op=LOAD Dec 13 01:50:09.087000 audit[4511]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000145770 a2=78 a3=c0003c3bd8 items=0 ppid=4134 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:09.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326539356637336530373565646338353361383937623761343037 Dec 13 01:50:09.087000 audit: BPF prog-id=200 op=UNLOAD Dec 13 01:50:09.087000 audit: BPF prog-id=199 op=UNLOAD Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { perfmon } for pid=4511 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit[4511]: AVC avc: denied { bpf } for pid=4511 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:09.087000 audit: BPF prog-id=201 op=LOAD Dec 13 01:50:09.087000 audit[4511]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000145c30 a2=78 a3=c0003c3fe8 items=0 ppid=4134 pid=4511 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:09.087000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3239326539356637336530373565646338353361383937623761343037 Dec 13 01:50:09.128939 env[1412]: time="2024-12-13T01:50:09.128869388Z" level=info msg="StartContainer for \"292e95f73e075edc853a897b7a407f0862ead95efe5b90d52dc4e7580e095870\" returns successfully" Dec 13 01:50:09.672000 audit[4483]: AVC avc: denied { watch } for pid=4483 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.2609799091/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c922 tclass=file permissive=0 Dec 13 01:50:09.672000 audit[4483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001b5f640 a2=fc6 a3=0 items=0 ppid=3984 pid=4483 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 key=(null) Dec 13 01:50:09.672000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:50:09.749764 kubelet[2444]: I1213 01:50:09.749691 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c87d4d589-x5jhp" podStartSLOduration=32.856167391 podStartE2EDuration="35.749668117s" podCreationTimestamp="2024-12-13 01:49:34 +0000 UTC" firstStartedPulling="2024-12-13 01:50:06.112323415 +0000 UTC m=+43.736362290" lastFinishedPulling="2024-12-13 01:50:09.005824141 +0000 UTC m=+46.629863016" observedRunningTime="2024-12-13 01:50:09.748889476 +0000 UTC m=+47.372928351" watchObservedRunningTime="2024-12-13 01:50:09.749668117 +0000 UTC m=+47.373707092" Dec 13 01:50:09.764000 audit[4541]: NETFILTER_CFG table=filter:119 family=2 entries=10 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:09.764000 audit[4541]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7ffff00c2c40 a2=0 a3=7ffff00c2c2c items=0 ppid=2621 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:09.764000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:09.769832 kubelet[2444]: I1213 01:50:09.769762 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-apiserver/calico-apiserver-c87d4d589-v7pqw" podStartSLOduration=31.987770391 podStartE2EDuration="35.769730368s" podCreationTimestamp="2024-12-13 01:49:34 +0000 UTC" firstStartedPulling="2024-12-13 01:50:04.837383001 +0000 UTC m=+42.461421876" lastFinishedPulling="2024-12-13 01:50:08.619342978 +0000 UTC m=+46.243381853" observedRunningTime="2024-12-13 01:50:09.768076281 +0000 UTC m=+47.392115156" watchObservedRunningTime="2024-12-13 01:50:09.769730368 +0000 UTC m=+47.393769243" Dec 13 01:50:09.774000 audit[4541]: NETFILTER_CFG table=nat:120 family=2 entries=20 op=nft_register_rule pid=4541 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:09.774000 audit[4541]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7ffff00c2c40 a2=0 a3=7ffff00c2c2c items=0 ppid=2621 pid=4541 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:09.774000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:09.790000 audit[4543]: NETFILTER_CFG table=filter:121 family=2 entries=10 op=nft_register_rule pid=4543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:09.790000 audit[4543]: SYSCALL arch=c000003e syscall=46 success=yes exit=3760 a0=3 a1=7fff655107e0 a2=0 a3=7fff655107cc items=0 ppid=2621 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:09.790000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:09.796000 audit[4543]: NETFILTER_CFG table=nat:122 family=2 entries=20 op=nft_register_rule pid=4543 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:09.796000 audit[4543]: SYSCALL arch=c000003e syscall=46 success=yes exit=5772 a0=3 a1=7fff655107e0 a2=0 a3=7fff655107cc items=0 ppid=2621 pid=4543 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:09.796000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:10.340000 audit[4521]: AVC avc: denied { watch } for pid=4521 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.37738128/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c587,c877 tclass=file permissive=0 Dec 13 01:50:10.340000 audit[4521]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0018e4500 a2=fc6 a3=0 items=0 ppid=4134 pid=4521 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 key=(null) Dec 13 01:50:10.340000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:50:10.540047 env[1412]: time="2024-12-13T01:50:10.539993038Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:10.548745 env[1412]: time="2024-12-13T01:50:10.548678188Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:10.552933 env[1412]: time="2024-12-13T01:50:10.552739299Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/csi:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:10.556137 env[1412]: time="2024-12-13T01:50:10.556102973Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/csi@sha256:eaa7e01fb16b603c155a67b81f16992281db7f831684c7b2081d3434587a7ff3,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:10.556677 env[1412]: time="2024-12-13T01:50:10.556644501Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/csi:v3.29.1\" returns image reference \"sha256:bda8c42e04758c4f061339e213f50ccdc7502c4176fbf631aa12357e62b63540\"" Dec 13 01:50:10.557925 env[1412]: time="2024-12-13T01:50:10.557881665Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\"" Dec 13 01:50:10.560019 env[1412]: time="2024-12-13T01:50:10.559988575Z" level=info msg="CreateContainer within sandbox \"251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce\" for container &ContainerMetadata{Name:calico-csi,Attempt:0,}" Dec 13 01:50:10.590652 systemd[1]: var-lib-containerd-tmpmounts-containerd\x2dmount3776542738.mount: Deactivated successfully. Dec 13 01:50:10.605867 env[1412]: time="2024-12-13T01:50:10.605107114Z" level=info msg="CreateContainer within sandbox \"251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce\" for &ContainerMetadata{Name:calico-csi,Attempt:0,} returns container id \"198db09326906402d50516245370a98e2c17fc753bf051fddb33e7c781dbb561\"" Dec 13 01:50:10.607373 env[1412]: time="2024-12-13T01:50:10.607340830Z" level=info msg="StartContainer for \"198db09326906402d50516245370a98e2c17fc753bf051fddb33e7c781dbb561\"" Dec 13 01:50:10.636649 systemd[1]: Started cri-containerd-198db09326906402d50516245370a98e2c17fc753bf051fddb33e7c781dbb561.scope. Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001bd6b0 a2=3c a3=7fb466fad598 items=0 ppid=4403 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:10.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139386462303933323639303634303264353035313632343533373061 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit: BPF prog-id=202 op=LOAD Dec 13 01:50:10.651000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bd9d8 a2=78 a3=c000302d18 items=0 ppid=4403 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:10.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139386462303933323639303634303264353035313632343533373061 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.651000 audit: BPF prog-id=203 op=LOAD Dec 13 01:50:10.651000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c0001bd770 a2=78 a3=c000302d68 items=0 ppid=4403 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:10.651000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139386462303933323639303634303264353035313632343533373061 Dec 13 01:50:10.652000 audit: BPF prog-id=203 op=UNLOAD Dec 13 01:50:10.652000 audit: BPF prog-id=202 op=UNLOAD Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { perfmon } for pid=4558 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit[4558]: AVC avc: denied { bpf } for pid=4558 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:10.652000 audit: BPF prog-id=204 op=LOAD Dec 13 01:50:10.652000 audit[4558]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001bdc30 a2=78 a3=c000302df8 items=0 ppid=4403 pid=4558 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:10.652000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3139386462303933323639303634303264353035313632343533373061 Dec 13 01:50:10.670768 env[1412]: time="2024-12-13T01:50:10.667757263Z" level=info msg="StartContainer for \"198db09326906402d50516245370a98e2c17fc753bf051fddb33e7c781dbb561\" returns successfully" Dec 13 01:50:10.741099 kubelet[2444]: I1213 01:50:10.740651 2444 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:50:10.741099 kubelet[2444]: I1213 01:50:10.740651 2444 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:50:13.391315 env[1412]: time="2024-12-13T01:50:13.391258466Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:13.395978 env[1412]: time="2024-12-13T01:50:13.395941202Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:13.399490 env[1412]: time="2024-12-13T01:50:13.399458979Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/kube-controllers:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:13.402681 env[1412]: time="2024-12-13T01:50:13.402650040Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/kube-controllers@sha256:1072d6a98167a14ca361e9ce757733f9bae36d1f1c6a9621ea10934b6b1e10d9,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:13.403204 env[1412]: time="2024-12-13T01:50:13.403173166Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/kube-controllers:v3.29.1\" returns image reference \"sha256:6331715a2ae96b18a770a395cac108321d108e445e08b616e5bc9fbd1f9c21da\"" Dec 13 01:50:13.405777 env[1412]: time="2024-12-13T01:50:13.405750496Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\"" Dec 13 01:50:13.425779 env[1412]: time="2024-12-13T01:50:13.425730202Z" level=info msg="CreateContainer within sandbox \"635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe\" for container &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,}" Dec 13 01:50:13.461825 env[1412]: time="2024-12-13T01:50:13.461774617Z" level=info msg="CreateContainer within sandbox \"635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe\" for &ContainerMetadata{Name:calico-kube-controllers,Attempt:0,} returns container id \"2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525\"" Dec 13 01:50:13.463915 env[1412]: time="2024-12-13T01:50:13.462262741Z" level=info msg="StartContainer for \"2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525\"" Dec 13 01:50:13.490593 systemd[1]: Started cri-containerd-2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525.scope. Dec 13 01:50:13.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.504000 audit[1]: AVC avc: denied { perfmon } for pid=1 comm="systemd" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.504000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[1]: AVC avc: denied { bpf } for pid=1 comm="systemd" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit: BPF prog-id=205 op=LOAD Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=0 a0=f a1=c000147c48 a2=10 a3=1c items=0 ppid=4389 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:13.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265333231616261386566306132303930616365656565626635376636 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=0 a1=c0001476b0 a2=3c a3=8 items=0 ppid=4389 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:13.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265333231616261386566306132303930616365656565626635376636 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit: BPF prog-id=206 op=LOAD Dec 13 01:50:13.505000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c0001479d8 a2=78 a3=c000286640 items=0 ppid=4389 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:13.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265333231616261386566306132303930616365656565626635376636 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.505000 audit: BPF prog-id=207 op=LOAD Dec 13 01:50:13.505000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=18 a0=5 a1=c000147770 a2=78 a3=c000286688 items=0 ppid=4389 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:13.505000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265333231616261386566306132303930616365656565626635376636 Dec 13 01:50:13.505000 audit: BPF prog-id=207 op=UNLOAD Dec 13 01:50:13.507000 audit: BPF prog-id=206 op=UNLOAD Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { perfmon } for pid=4597 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit[4597]: AVC avc: denied { bpf } for pid=4597 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:13.507000 audit: BPF prog-id=208 op=LOAD Dec 13 01:50:13.507000 audit[4597]: SYSCALL arch=c000003e syscall=321 success=yes exit=16 a0=5 a1=c000147c30 a2=78 a3=c000286a98 items=0 ppid=4389 pid=4597 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:13.507000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3265333231616261386566306132303930616365656565626635376636 Dec 13 01:50:13.539937 env[1412]: time="2024-12-13T01:50:13.539834846Z" level=info msg="StartContainer for \"2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525\" returns successfully" Dec 13 01:50:13.769108 kubelet[2444]: I1213 01:50:13.768671 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/calico-kube-controllers-955cfb777-kkbj7" podStartSLOduration=32.976157946 podStartE2EDuration="38.768647866s" podCreationTimestamp="2024-12-13 01:49:35 +0000 UTC" firstStartedPulling="2024-12-13 01:50:07.611851605 +0000 UTC m=+45.235890580" lastFinishedPulling="2024-12-13 01:50:13.404341525 +0000 UTC m=+51.028380500" observedRunningTime="2024-12-13 01:50:13.766433754 +0000 UTC m=+51.390472629" watchObservedRunningTime="2024-12-13 01:50:13.768647866 +0000 UTC m=+51.392686841" Dec 13 01:50:15.170026 env[1412]: time="2024-12-13T01:50:15.169976684Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:15.174792 env[1412]: time="2024-12-13T01:50:15.174751520Z" level=info msg="ImageCreate event &ImageCreate{Name:sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:15.177998 env[1412]: time="2024-12-13T01:50:15.177964879Z" level=info msg="ImageUpdate event &ImageUpdate{Name:ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:15.181363 env[1412]: time="2024-12-13T01:50:15.181327445Z" level=info msg="ImageCreate event &ImageCreate{Name:ghcr.io/flatcar/calico/node-driver-registrar@sha256:a338da9488cbaa83c78457c3d7354d84149969c0480e88dd768e036632ff5b76,Labels:map[string]string{io.cri-containerd.image: managed,},XXX_unrecognized:[],}" Dec 13 01:50:15.181858 env[1412]: time="2024-12-13T01:50:15.181825970Z" level=info msg="PullImage \"ghcr.io/flatcar/calico/node-driver-registrar:v3.29.1\" returns image reference \"sha256:8b7d18f262d5cf6a6343578ad0db68a140c4c9989d9e02c58c27cb5d2c70320f\"" Dec 13 01:50:15.185836 env[1412]: time="2024-12-13T01:50:15.185802366Z" level=info msg="CreateContainer within sandbox \"251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce\" for container &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,}" Dec 13 01:50:15.225363 env[1412]: time="2024-12-13T01:50:15.225312718Z" level=info msg="CreateContainer within sandbox \"251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce\" for &ContainerMetadata{Name:csi-node-driver-registrar,Attempt:0,} returns container id \"5ac9dda3bbd79497c3af7f153580679951209ee2de7a2f61cb0e130d2c40a80a\"" Dec 13 01:50:15.226011 env[1412]: time="2024-12-13T01:50:15.225973851Z" level=info msg="StartContainer for \"5ac9dda3bbd79497c3af7f153580679951209ee2de7a2f61cb0e130d2c40a80a\"" Dec 13 01:50:15.261739 systemd[1]: run-containerd-runc-k8s.io-5ac9dda3bbd79497c3af7f153580679951209ee2de7a2f61cb0e130d2c40a80a-runc.VuLKLS.mount: Deactivated successfully. Dec 13 01:50:15.265570 systemd[1]: Started cri-containerd-5ac9dda3bbd79497c3af7f153580679951209ee2de7a2f61cb0e130d2c40a80a.scope. Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.290143 kernel: kauditd_printk_skb: 222 callbacks suppressed Dec 13 01:50:15.290245 kernel: audit: type=1400 audit(1734054615.280:1359): avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f4a33b58588 items=0 ppid=4403 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:15.331064 kernel: audit: type=1300 audit(1734054615.280:1359): arch=c000003e syscall=321 success=yes exit=15 a0=0 a1=c0001496b0 a2=3c a3=7f4a33b58588 items=0 ppid=4403 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:15.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633964646133626264373934393763336166376631353335383036 Dec 13 01:50:15.348717 env[1412]: time="2024-12-13T01:50:15.348670814Z" level=info msg="StartContainer for \"5ac9dda3bbd79497c3af7f153580679951209ee2de7a2f61cb0e130d2c40a80a\" returns successfully" Dec 13 01:50:15.349024 kernel: audit: type=1327 audit(1734054615.280:1359): proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633964646133626264373934393763336166376631353335383036 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.374221 kernel: audit: type=1400 audit(1734054615.280:1360): avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.374314 kernel: audit: type=1400 audit(1734054615.280:1360): avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.389744 kernel: audit: type=1400 audit(1734054615.280:1360): avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.403416 kernel: audit: type=1400 audit(1734054615.280:1360): avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.403725 kernel: audit: type=1400 audit(1734054615.280:1360): avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.421193 kernel: audit: type=1400 audit(1734054615.280:1360): avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.450311 kernel: audit: type=1400 audit(1734054615.280:1360): avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit: BPF prog-id=209 op=LOAD Dec 13 01:50:15.280000 audit[4652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c0001499d8 a2=78 a3=c00033fee8 items=0 ppid=4403 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:15.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633964646133626264373934393763336166376631353335383036 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit: BPF prog-id=210 op=LOAD Dec 13 01:50:15.280000 audit[4652]: SYSCALL arch=c000003e syscall=321 success=yes exit=17 a0=5 a1=c000149770 a2=78 a3=c00033ff38 items=0 ppid=4403 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:15.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633964646133626264373934393763336166376631353335383036 Dec 13 01:50:15.280000 audit: BPF prog-id=210 op=UNLOAD Dec 13 01:50:15.280000 audit: BPF prog-id=209 op=UNLOAD Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { perfmon } for pid=4652 comm="runc" capability=38 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit[4652]: AVC avc: denied { bpf } for pid=4652 comm="runc" capability=39 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=0 Dec 13 01:50:15.280000 audit: BPF prog-id=211 op=LOAD Dec 13 01:50:15.280000 audit[4652]: SYSCALL arch=c000003e syscall=321 success=yes exit=15 a0=5 a1=c000149c30 a2=78 a3=c00033ffc8 items=0 ppid=4403 pid=4652 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="runc" exe="/run/torcx/unpack/docker/bin/runc" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:15.280000 audit: PROCTITLE proctitle=72756E63002D2D726F6F74002F72756E2F636F6E7461696E6572642F72756E632F6B38732E696F002D2D6C6F67002F72756E2F636F6E7461696E6572642F696F2E636F6E7461696E6572642E72756E74696D652E76322E7461736B2F6B38732E696F2F3561633964646133626264373934393763336166376631353335383036 Dec 13 01:50:15.557501 kubelet[2444]: I1213 01:50:15.557464 2444 csi_plugin.go:100] kubernetes.io/csi: Trying to validate a new CSI Driver with name: csi.tigera.io endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock versions: 1.0.0 Dec 13 01:50:15.557501 kubelet[2444]: I1213 01:50:15.557503 2444 csi_plugin.go:113] kubernetes.io/csi: Register new plugin with name: csi.tigera.io at endpoint: /var/lib/kubelet/plugins/csi.tigera.io/csi.sock Dec 13 01:50:18.146670 kubelet[2444]: I1213 01:50:18.146273 2444 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:50:18.170162 kubelet[2444]: I1213 01:50:18.170069 2444 pod_startup_latency_tracker.go:104] "Observed pod startup duration" pod="calico-system/csi-node-driver-t2mmp" podStartSLOduration=35.561252747 podStartE2EDuration="43.170043884s" podCreationTimestamp="2024-12-13 01:49:35 +0000 UTC" firstStartedPulling="2024-12-13 01:50:07.574273894 +0000 UTC m=+45.198312769" lastFinishedPulling="2024-12-13 01:50:15.183064931 +0000 UTC m=+52.807103906" observedRunningTime="2024-12-13 01:50:15.770804172 +0000 UTC m=+53.394843047" watchObservedRunningTime="2024-12-13 01:50:18.170043884 +0000 UTC m=+55.794082859" Dec 13 01:50:18.188000 audit[4685]: NETFILTER_CFG table=filter:123 family=2 entries=9 op=nft_register_rule pid=4685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:18.188000 audit[4685]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffc7e657080 a2=0 a3=7ffc7e65706c items=0 ppid=2621 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:18.188000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:18.193000 audit[4685]: NETFILTER_CFG table=nat:124 family=2 entries=27 op=nft_register_chain pid=4685 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:18.193000 audit[4685]: SYSCALL arch=c000003e syscall=46 success=yes exit=9348 a0=3 a1=7ffc7e657080 a2=0 a3=7ffc7e65706c items=0 ppid=2621 pid=4685 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:18.193000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:18.835000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:18.835000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:18.835000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c0029a84b0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:50:18.835000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:50:18.835000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0029886a0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:50:18.835000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:50:19.463000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:19.463000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:19.463000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c01082c270 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:50:19.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:50:19.463000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:19.463000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c01082c300 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:50:19.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:50:19.463000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c01074ad60 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:50:19.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:50:19.538000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:19.538000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c01082c420 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:50:19.538000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:50:19.562000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:19.562000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:19.562000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=6e a1=c010774fc0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:50:19.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:50:19.562000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c0106f1680 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:50:19.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:50:22.465990 env[1412]: time="2024-12-13T01:50:22.465936104Z" level=info msg="StopPodSandbox for \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\"" Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.518 [WARNING][4704] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"739d2c4b-57e6-401b-93fa-cecc2c721ae5", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4", Pod:"coredns-6f6b679f8f-bncnx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.55.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliad07bb0a5d9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.518 [INFO][4704] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.518 [INFO][4704] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" iface="eth0" netns="" Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.518 [INFO][4704] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.518 [INFO][4704] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.547 [INFO][4712] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" HandleID="k8s-pod-network.2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.547 [INFO][4712] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.547 [INFO][4712] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.554 [WARNING][4712] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" HandleID="k8s-pod-network.2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.554 [INFO][4712] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" HandleID="k8s-pod-network.2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.556 [INFO][4712] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:22.557789 env[1412]: 2024-12-13 01:50:22.556 [INFO][4704] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:22.558410 env[1412]: time="2024-12-13T01:50:22.558376609Z" level=info msg="TearDown network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\" successfully" Dec 13 01:50:22.558487 env[1412]: time="2024-12-13T01:50:22.558472714Z" level=info msg="StopPodSandbox for \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\" returns successfully" Dec 13 01:50:22.559020 env[1412]: time="2024-12-13T01:50:22.558987538Z" level=info msg="RemovePodSandbox for \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\"" Dec 13 01:50:22.559172 env[1412]: time="2024-12-13T01:50:22.559137245Z" level=info msg="Forcibly stopping sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\"" Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.591 [WARNING][4731] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"739d2c4b-57e6-401b-93fa-cecc2c721ae5", ResourceVersion:"755", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"0a9b278f62b7ef7aef24bc98825351f66d42c36ee6a6e1b9e90249ab9180d3e4", Pod:"coredns-6f6b679f8f-bncnx", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.55.1/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"caliad07bb0a5d9", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.591 [INFO][4731] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.591 [INFO][4731] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" iface="eth0" netns="" Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.591 [INFO][4731] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.591 [INFO][4731] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.610 [INFO][4737] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" HandleID="k8s-pod-network.2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.610 [INFO][4737] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.610 [INFO][4737] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.616 [WARNING][4737] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" HandleID="k8s-pod-network.2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.616 [INFO][4737] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" HandleID="k8s-pod-network.2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--bncnx-eth0" Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.617 [INFO][4737] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:22.619752 env[1412]: 2024-12-13 01:50:22.618 [INFO][4731] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de" Dec 13 01:50:22.620436 env[1412]: time="2024-12-13T01:50:22.619987879Z" level=info msg="TearDown network for sandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\" successfully" Dec 13 01:50:22.629858 env[1412]: time="2024-12-13T01:50:22.629817537Z" level=info msg="RemovePodSandbox \"2166b203338b46ab1c14dd3d535e7f8b0730ecbcdaeae0d5fb688b70fc7988de\" returns successfully" Dec 13 01:50:22.631023 env[1412]: time="2024-12-13T01:50:22.630982091Z" level=info msg="StopPodSandbox for \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\"" Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.691 [WARNING][4755] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0", GenerateName:"calico-kube-controllers-955cfb777-", Namespace:"calico-system", SelfLink:"", UID:"3b2e20c2-5f0a-4735-afcc-b2f438a0615b", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"955cfb777", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe", Pod:"calico-kube-controllers-955cfb777-kkbj7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.55.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic1878784717", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.693 [INFO][4755] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.693 [INFO][4755] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" iface="eth0" netns="" Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.693 [INFO][4755] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.693 [INFO][4755] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.713 [INFO][4762] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" HandleID="k8s-pod-network.fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.713 [INFO][4762] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.713 [INFO][4762] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.724 [WARNING][4762] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" HandleID="k8s-pod-network.fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.724 [INFO][4762] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" HandleID="k8s-pod-network.fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.725 [INFO][4762] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:22.727332 env[1412]: 2024-12-13 01:50:22.726 [INFO][4755] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:22.728198 env[1412]: time="2024-12-13T01:50:22.728156717Z" level=info msg="TearDown network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\" successfully" Dec 13 01:50:22.728315 env[1412]: time="2024-12-13T01:50:22.728291923Z" level=info msg="StopPodSandbox for \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\" returns successfully" Dec 13 01:50:22.729411 env[1412]: time="2024-12-13T01:50:22.729381474Z" level=info msg="RemovePodSandbox for \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\"" Dec 13 01:50:22.729529 env[1412]: time="2024-12-13T01:50:22.729414876Z" level=info msg="Forcibly stopping sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\"" Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.761 [WARNING][4781] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0", GenerateName:"calico-kube-controllers-955cfb777-", Namespace:"calico-system", SelfLink:"", UID:"3b2e20c2-5f0a-4735-afcc-b2f438a0615b", ResourceVersion:"841", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"calico-kube-controllers", "k8s-app":"calico-kube-controllers", "pod-template-hash":"955cfb777", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-kube-controllers"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"635ca37982fb367778f11bf60307a67aaeed56087fe9deeba42fdc891ac91afe", Pod:"calico-kube-controllers-955cfb777-kkbj7", Endpoint:"eth0", ServiceAccountName:"calico-kube-controllers", IPNetworks:[]string{"192.168.55.5/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.calico-kube-controllers"}, InterfaceName:"calic1878784717", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.762 [INFO][4781] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.762 [INFO][4781] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" iface="eth0" netns="" Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.762 [INFO][4781] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.762 [INFO][4781] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.788 [INFO][4787] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" HandleID="k8s-pod-network.fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.789 [INFO][4787] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.789 [INFO][4787] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.794 [WARNING][4787] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" HandleID="k8s-pod-network.fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.794 [INFO][4787] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" HandleID="k8s-pod-network.fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--kube--controllers--955cfb777--kkbj7-eth0" Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.796 [INFO][4787] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:22.798978 env[1412]: 2024-12-13 01:50:22.797 [INFO][4781] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c" Dec 13 01:50:22.799659 env[1412]: time="2024-12-13T01:50:22.799009517Z" level=info msg="TearDown network for sandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\" successfully" Dec 13 01:50:22.806870 env[1412]: time="2024-12-13T01:50:22.806825381Z" level=info msg="RemovePodSandbox \"fae9b63259d115c4502fabbf9bbfef6ae3f84d5ee04e1952b433e15e8a4a464c\" returns successfully" Dec 13 01:50:22.807317 env[1412]: time="2024-12-13T01:50:22.807288202Z" level=info msg="StopPodSandbox for \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\"" Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.839 [WARNING][4807] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab", Pod:"coredns-6f6b679f8f-chq67", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.55.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali93d09f86e5c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.839 [INFO][4807] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.839 [INFO][4807] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" iface="eth0" netns="" Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.840 [INFO][4807] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.840 [INFO][4807] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.859 [INFO][4813] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" HandleID="k8s-pod-network.43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.859 [INFO][4813] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.859 [INFO][4813] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.864 [WARNING][4813] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" HandleID="k8s-pod-network.43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.864 [INFO][4813] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" HandleID="k8s-pod-network.43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.865 [INFO][4813] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:22.867764 env[1412]: 2024-12-13 01:50:22.866 [INFO][4807] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:22.868564 env[1412]: time="2024-12-13T01:50:22.867792520Z" level=info msg="TearDown network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\" successfully" Dec 13 01:50:22.868564 env[1412]: time="2024-12-13T01:50:22.867834522Z" level=info msg="StopPodSandbox for \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\" returns successfully" Dec 13 01:50:22.868564 env[1412]: time="2024-12-13T01:50:22.868434850Z" level=info msg="RemovePodSandbox for \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\"" Dec 13 01:50:22.868564 env[1412]: time="2024-12-13T01:50:22.868477052Z" level=info msg="Forcibly stopping sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\"" Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.912 [WARNING][4832] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0", GenerateName:"coredns-6f6b679f8f-", Namespace:"kube-system", SelfLink:"", UID:"9b953f4f-1d58-4af5-9cb0-4c8c76c4fbe4", ResourceVersion:"793", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 27, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"k8s-app":"kube-dns", "pod-template-hash":"6f6b679f8f", "projectcalico.org/namespace":"kube-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"coredns"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"6d01e5759b6290220e67c3171d483df88c7d698d466693cea8005467dba2cbab", Pod:"coredns-6f6b679f8f-chq67", Endpoint:"eth0", ServiceAccountName:"coredns", IPNetworks:[]string{"192.168.55.4/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.kube-system", "ksa.kube-system.coredns"}, InterfaceName:"cali93d09f86e5c", MAC:"", Ports:[]v3.WorkloadEndpointPort{v3.WorkloadEndpointPort{Name:"dns", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"UDP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"dns-tcp", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x35, HostPort:0x0, HostIP:""}, v3.WorkloadEndpointPort{Name:"metrics", Protocol:numorstring.Protocol{Type:1, NumVal:0x0, StrVal:"TCP"}, Port:0x23c1, HostPort:0x0, HostIP:""}}, AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.913 [INFO][4832] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.913 [INFO][4832] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" iface="eth0" netns="" Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.913 [INFO][4832] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.913 [INFO][4832] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.933 [INFO][4838] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" HandleID="k8s-pod-network.43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.933 [INFO][4838] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.933 [INFO][4838] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.939 [WARNING][4838] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" HandleID="k8s-pod-network.43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.939 [INFO][4838] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" HandleID="k8s-pod-network.43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Workload="ci--3510.3.6--a--92bad84337-k8s-coredns--6f6b679f8f--chq67-eth0" Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.940 [INFO][4838] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:22.942685 env[1412]: 2024-12-13 01:50:22.941 [INFO][4832] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877" Dec 13 01:50:22.943421 env[1412]: time="2024-12-13T01:50:22.942723810Z" level=info msg="TearDown network for sandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\" successfully" Dec 13 01:50:22.950674 env[1412]: time="2024-12-13T01:50:22.950632479Z" level=info msg="RemovePodSandbox \"43460d9c43b09c394cd7777dfb3f76a62214bc39826c8d520e330e63d3511877\" returns successfully" Dec 13 01:50:22.951193 env[1412]: time="2024-12-13T01:50:22.951157103Z" level=info msg="StopPodSandbox for \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\"" Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:22.985 [WARNING][4857] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0", GenerateName:"calico-apiserver-c87d4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"db6522ed-ade8-4bda-84b5-172c7548fe69", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c87d4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713", Pod:"calico-apiserver-c87d4d589-v7pqw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.55.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif91c9a0c2da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:22.986 [INFO][4857] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:22.986 [INFO][4857] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" iface="eth0" netns="" Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:22.986 [INFO][4857] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:22.986 [INFO][4857] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:23.007 [INFO][4863] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" HandleID="k8s-pod-network.d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:23.007 [INFO][4863] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:23.007 [INFO][4863] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:23.012 [WARNING][4863] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" HandleID="k8s-pod-network.d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:23.012 [INFO][4863] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" HandleID="k8s-pod-network.d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:23.013 [INFO][4863] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:23.015888 env[1412]: 2024-12-13 01:50:23.014 [INFO][4857] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:23.016988 env[1412]: time="2024-12-13T01:50:23.015852611Z" level=info msg="TearDown network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\" successfully" Dec 13 01:50:23.017160 env[1412]: time="2024-12-13T01:50:23.017130770Z" level=info msg="StopPodSandbox for \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\" returns successfully" Dec 13 01:50:23.018402 env[1412]: time="2024-12-13T01:50:23.018366127Z" level=info msg="RemovePodSandbox for \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\"" Dec 13 01:50:23.018502 env[1412]: time="2024-12-13T01:50:23.018410029Z" level=info msg="Forcibly stopping sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\"" Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.053 [WARNING][4881] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0", GenerateName:"calico-apiserver-c87d4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"db6522ed-ade8-4bda-84b5-172c7548fe69", ResourceVersion:"819", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c87d4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"2ec6544abf4f1e116be1b7d3c08d6d611a0c5d7c0fa1754523051b0ca8342713", Pod:"calico-apiserver-c87d4d589-v7pqw", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.55.2/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calif91c9a0c2da", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.053 [INFO][4881] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.053 [INFO][4881] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" iface="eth0" netns="" Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.053 [INFO][4881] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.053 [INFO][4881] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.082 [INFO][4887] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" HandleID="k8s-pod-network.d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.083 [INFO][4887] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.083 [INFO][4887] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.088 [WARNING][4887] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" HandleID="k8s-pod-network.d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.088 [INFO][4887] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" HandleID="k8s-pod-network.d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--v7pqw-eth0" Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.090 [INFO][4887] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:23.092103 env[1412]: 2024-12-13 01:50:23.091 [INFO][4881] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1" Dec 13 01:50:23.092766 env[1412]: time="2024-12-13T01:50:23.092134937Z" level=info msg="TearDown network for sandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\" successfully" Dec 13 01:50:23.101391 env[1412]: time="2024-12-13T01:50:23.101291960Z" level=info msg="RemovePodSandbox \"d278e1343df573418ac58946c41302022bc73140548fadfb94930b8a713cc6d1\" returns successfully" Dec 13 01:50:23.102397 env[1412]: time="2024-12-13T01:50:23.102363510Z" level=info msg="StopPodSandbox for \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\"" Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.133 [WARNING][4905] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0", GenerateName:"calico-apiserver-c87d4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"d3874a66-1fc2-4d94-8282-e2b409f57d2c", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c87d4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7", Pod:"calico-apiserver-c87d4d589-x5jhp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.55.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia960e0a97cc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.133 [INFO][4905] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.133 [INFO][4905] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" iface="eth0" netns="" Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.133 [INFO][4905] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.133 [INFO][4905] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.151 [INFO][4911] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" HandleID="k8s-pod-network.ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.151 [INFO][4911] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.151 [INFO][4911] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.158 [WARNING][4911] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" HandleID="k8s-pod-network.ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.158 [INFO][4911] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" HandleID="k8s-pod-network.ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.159 [INFO][4911] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:23.161588 env[1412]: 2024-12-13 01:50:23.160 [INFO][4905] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:23.162253 env[1412]: time="2024-12-13T01:50:23.161628849Z" level=info msg="TearDown network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\" successfully" Dec 13 01:50:23.162253 env[1412]: time="2024-12-13T01:50:23.161665650Z" level=info msg="StopPodSandbox for \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\" returns successfully" Dec 13 01:50:23.162357 env[1412]: time="2024-12-13T01:50:23.162320581Z" level=info msg="RemovePodSandbox for \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\"" Dec 13 01:50:23.162412 env[1412]: time="2024-12-13T01:50:23.162367883Z" level=info msg="Forcibly stopping sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\"" Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.193 [WARNING][4929] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0", GenerateName:"calico-apiserver-c87d4d589-", Namespace:"calico-apiserver", SelfLink:"", UID:"d3874a66-1fc2-4d94-8282-e2b409f57d2c", ResourceVersion:"857", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 34, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"apiserver":"true", "app.kubernetes.io/name":"calico-apiserver", "k8s-app":"calico-apiserver", "pod-template-hash":"c87d4d589", "projectcalico.org/namespace":"calico-apiserver", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"calico-apiserver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"40e2e8d63b63c9cf9ebcbd9fd24730d3d322607ba7a4f110dd40897df4d5dfd7", Pod:"calico-apiserver-c87d4d589-x5jhp", Endpoint:"eth0", ServiceAccountName:"calico-apiserver", IPNetworks:[]string{"192.168.55.3/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-apiserver", "ksa.calico-apiserver.calico-apiserver"}, InterfaceName:"calia960e0a97cc", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.194 [INFO][4929] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.194 [INFO][4929] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" iface="eth0" netns="" Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.194 [INFO][4929] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.194 [INFO][4929] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.213 [INFO][4936] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" HandleID="k8s-pod-network.ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.213 [INFO][4936] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.213 [INFO][4936] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.218 [WARNING][4936] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" HandleID="k8s-pod-network.ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.218 [INFO][4936] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" HandleID="k8s-pod-network.ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Workload="ci--3510.3.6--a--92bad84337-k8s-calico--apiserver--c87d4d589--x5jhp-eth0" Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.219 [INFO][4936] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:23.221873 env[1412]: 2024-12-13 01:50:23.220 [INFO][4929] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7" Dec 13 01:50:23.222627 env[1412]: time="2024-12-13T01:50:23.221902235Z" level=info msg="TearDown network for sandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\" successfully" Dec 13 01:50:23.230513 env[1412]: time="2024-12-13T01:50:23.230393427Z" level=info msg="RemovePodSandbox \"ac33874146ccf2bde1a6f2a297dc8fbe2754ce84a33486dd7f1284189a6706b7\" returns successfully" Dec 13 01:50:23.231692 env[1412]: time="2024-12-13T01:50:23.231651385Z" level=info msg="StopPodSandbox for \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\"" Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.263 [WARNING][4955] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dee8dd51-2759-489b-acfd-de00febc629a", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce", Pod:"csi-node-driver-t2mmp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibfc28a6e1eb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.263 [INFO][4955] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.264 [INFO][4955] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" iface="eth0" netns="" Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.264 [INFO][4955] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.264 [INFO][4955] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.290 [INFO][4961] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" HandleID="k8s-pod-network.9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.290 [INFO][4961] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.290 [INFO][4961] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.295 [WARNING][4961] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" HandleID="k8s-pod-network.9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.295 [INFO][4961] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" HandleID="k8s-pod-network.9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.297 [INFO][4961] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:23.298874 env[1412]: 2024-12-13 01:50:23.297 [INFO][4955] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:23.300752 env[1412]: time="2024-12-13T01:50:23.298847691Z" level=info msg="TearDown network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\" successfully" Dec 13 01:50:23.300844 env[1412]: time="2024-12-13T01:50:23.300751879Z" level=info msg="StopPodSandbox for \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\" returns successfully" Dec 13 01:50:23.301289 env[1412]: time="2024-12-13T01:50:23.301257702Z" level=info msg="RemovePodSandbox for \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\"" Dec 13 01:50:23.301401 env[1412]: time="2024-12-13T01:50:23.301293904Z" level=info msg="Forcibly stopping sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\"" Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.333 [WARNING][4979] cni-plugin/k8s.go 572: CNI_CONTAINERID does not match WorkloadEndpoint ContainerID, don't delete WEP. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" WorkloadEndpoint=&v3.WorkloadEndpoint{TypeMeta:v1.TypeMeta{Kind:"WorkloadEndpoint", APIVersion:"projectcalico.org/v3"}, ObjectMeta:v1.ObjectMeta{Name:"ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0", GenerateName:"csi-node-driver-", Namespace:"calico-system", SelfLink:"", UID:"dee8dd51-2759-489b-acfd-de00febc629a", ResourceVersion:"852", Generation:0, CreationTimestamp:time.Date(2024, time.December, 13, 1, 49, 35, 0, time.Local), DeletionTimestamp:, DeletionGracePeriodSeconds:(*int64)(nil), Labels:map[string]string{"app.kubernetes.io/name":"csi-node-driver", "controller-revision-hash":"56747c9949", "k8s-app":"csi-node-driver", "name":"csi-node-driver", "pod-template-generation":"1", "projectcalico.org/namespace":"calico-system", "projectcalico.org/orchestrator":"k8s", "projectcalico.org/serviceaccount":"csi-node-driver"}, Annotations:map[string]string(nil), OwnerReferences:[]v1.OwnerReference(nil), Finalizers:[]string(nil), ManagedFields:[]v1.ManagedFieldsEntry(nil)}, Spec:v3.WorkloadEndpointSpec{Orchestrator:"k8s", Workload:"", Node:"ci-3510.3.6-a-92bad84337", ContainerID:"251bce51ce3660d143fc716bb48f32c5ffb4fa88a9a36fb4b3a24d42fdf6ecce", Pod:"csi-node-driver-t2mmp", Endpoint:"eth0", ServiceAccountName:"csi-node-driver", IPNetworks:[]string{"192.168.55.6/32"}, IPNATs:[]v3.IPNAT(nil), IPv4Gateway:"", IPv6Gateway:"", Profiles:[]string{"kns.calico-system", "ksa.calico-system.csi-node-driver"}, InterfaceName:"calibfc28a6e1eb", MAC:"", Ports:[]v3.WorkloadEndpointPort(nil), AllowSpoofedSourcePrefixes:[]string(nil)}} Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.333 [INFO][4979] cni-plugin/k8s.go 608: Cleaning up netns ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.334 [INFO][4979] cni-plugin/dataplane_linux.go 555: CleanUpNamespace called with no netns name, ignoring. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" iface="eth0" netns="" Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.334 [INFO][4979] cni-plugin/k8s.go 615: Releasing IP address(es) ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.334 [INFO][4979] cni-plugin/utils.go 188: Calico CNI releasing IP address ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.354 [INFO][4986] ipam/ipam_plugin.go 412: Releasing address using handleID ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" HandleID="k8s-pod-network.9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.354 [INFO][4986] ipam/ipam_plugin.go 353: About to acquire host-wide IPAM lock. Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.354 [INFO][4986] ipam/ipam_plugin.go 368: Acquired host-wide IPAM lock. Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.360 [WARNING][4986] ipam/ipam_plugin.go 429: Asked to release address but it doesn't exist. Ignoring ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" HandleID="k8s-pod-network.9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.360 [INFO][4986] ipam/ipam_plugin.go 440: Releasing address using workloadID ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" HandleID="k8s-pod-network.9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Workload="ci--3510.3.6--a--92bad84337-k8s-csi--node--driver--t2mmp-eth0" Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.361 [INFO][4986] ipam/ipam_plugin.go 374: Released host-wide IPAM lock. Dec 13 01:50:23.363340 env[1412]: 2024-12-13 01:50:23.362 [INFO][4979] cni-plugin/k8s.go 621: Teardown processing complete. ContainerID="9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f" Dec 13 01:50:23.364147 env[1412]: time="2024-12-13T01:50:23.363367073Z" level=info msg="TearDown network for sandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\" successfully" Dec 13 01:50:23.372208 env[1412]: time="2024-12-13T01:50:23.372173480Z" level=info msg="RemovePodSandbox \"9dd285a9b6a943e2c2ce8be81d6a3de9551b3bfba61c184463327baa54240e5f\" returns successfully" Dec 13 01:50:23.577000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:23.583588 kernel: kauditd_printk_skb: 63 callbacks suppressed Dec 13 01:50:23.583675 kernel: audit: type=1400 audit(1734054623.577:1375): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:23.577000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002988be0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:50:23.620962 kernel: audit: type=1300 audit(1734054623.577:1375): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002988be0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:50:23.621047 kernel: audit: type=1327 audit(1734054623.577:1375): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:50:23.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:50:23.643077 kernel: audit: type=1400 audit(1734054623.577:1376): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:23.577000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:23.577000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002988c00 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:50:23.655939 kernel: audit: type=1300 audit(1734054623.577:1376): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002988c00 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:50:23.577000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:50:23.678572 kernel: audit: type=1327 audit(1734054623.577:1376): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:50:23.580000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:23.709849 kernel: audit: type=1400 audit(1734054623.580:1377): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:23.580000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a7c540 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:50:23.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:50:23.735324 kernel: audit: type=1300 audit(1734054623.580:1377): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002a7c540 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:50:23.736013 kernel: audit: type=1327 audit(1734054623.580:1377): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:50:23.755047 kernel: audit: type=1400 audit(1734054623.582:1378): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:23.582000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:50:23.582000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002988da0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:50:23.582000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:50:25.523701 systemd[1]: run-containerd-runc-k8s.io-74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69-runc.QN9zd6.mount: Deactivated successfully. Dec 13 01:50:36.456731 systemd[1]: run-containerd-runc-k8s.io-2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525-runc.JdSzjv.mount: Deactivated successfully. Dec 13 01:50:45.022060 kubelet[2444]: I1213 01:50:45.022015 2444 prober_manager.go:312] "Failed to trigger a manual run" probe="Readiness" Dec 13 01:50:45.079961 kernel: kauditd_printk_skb: 2 callbacks suppressed Dec 13 01:50:45.080102 kernel: audit: type=1325 audit(1734054645.073:1379): table=filter:125 family=2 entries=8 op=nft_register_rule pid=5049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:45.073000 audit[5049]: NETFILTER_CFG table=filter:125 family=2 entries=8 op=nft_register_rule pid=5049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:45.073000 audit[5049]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcaa37f400 a2=0 a3=7ffcaa37f3ec items=0 ppid=2621 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:45.116546 kernel: audit: type=1300 audit(1734054645.073:1379): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7ffcaa37f400 a2=0 a3=7ffcaa37f3ec items=0 ppid=2621 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:45.073000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:45.129030 kernel: audit: type=1327 audit(1734054645.073:1379): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:45.131000 audit[5049]: NETFILTER_CFG table=nat:126 family=2 entries=34 op=nft_register_chain pid=5049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:45.156195 kernel: audit: type=1325 audit(1734054645.131:1380): table=nat:126 family=2 entries=34 op=nft_register_chain pid=5049 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:50:45.156315 kernel: audit: type=1300 audit(1734054645.131:1380): arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcaa37f400 a2=0 a3=7ffcaa37f3ec items=0 ppid=2621 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:45.131000 audit[5049]: SYSCALL arch=c000003e syscall=46 success=yes exit=11236 a0=3 a1=7ffcaa37f400 a2=0 a3=7ffcaa37f3ec items=0 ppid=2621 pid=5049 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:50:45.131000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:45.183564 kernel: audit: type=1327 audit(1734054645.131:1380): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:50:55.513207 systemd[1]: run-containerd-runc-k8s.io-74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69-runc.MubHkz.mount: Deactivated successfully. Dec 13 01:51:09.673000 audit[4483]: AVC avc: denied { watch } for pid=4483 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.2609799091/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c922 tclass=file permissive=0 Dec 13 01:51:09.704262 kernel: audit: type=1400 audit(1734054669.673:1381): avc: denied { watch } for pid=4483 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.2609799091/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c922 tclass=file permissive=0 Dec 13 01:51:09.706028 kernel: audit: type=1300 audit(1734054669.673:1381): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0013804e0 a2=fc6 a3=0 items=0 ppid=3984 pid=4483 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 key=(null) Dec 13 01:51:09.673000 audit[4483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c0013804e0 a2=fc6 a3=0 items=0 ppid=3984 pid=4483 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 key=(null) Dec 13 01:51:09.673000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:51:09.740936 kernel: audit: type=1327 audit(1734054669.673:1381): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:51:10.342000 audit[4521]: AVC avc: denied { watch } for pid=4521 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.37738128/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c587,c877 tclass=file permissive=0 Dec 13 01:51:10.342000 audit[4521]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001949860 a2=fc6 a3=0 items=0 ppid=4134 pid=4521 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 key=(null) Dec 13 01:51:10.389219 kernel: audit: type=1400 audit(1734054670.342:1382): avc: denied { watch } for pid=4521 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.37738128/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c587,c877 tclass=file permissive=0 Dec 13 01:51:10.389372 kernel: audit: type=1300 audit(1734054670.342:1382): arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c001949860 a2=fc6 a3=0 items=0 ppid=4134 pid=4521 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 key=(null) Dec 13 01:51:10.390377 kernel: audit: type=1327 audit(1734054670.342:1382): proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:51:10.342000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:51:18.836000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:18.836000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:18.881633 kernel: audit: type=1400 audit(1734054678.836:1383): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:18.882881 kernel: audit: type=1400 audit(1734054678.836:1384): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:18.883515 kernel: audit: type=1300 audit(1734054678.836:1384): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fcff20 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:51:18.836000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000fcff20 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:51:18.836000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:51:18.930808 kernel: audit: type=1327 audit(1734054678.836:1384): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:51:18.836000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000366e00 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:51:18.836000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:51:18.980419 kernel: audit: type=1300 audit(1734054678.836:1383): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000366e00 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:51:18.980555 kernel: audit: type=1327 audit(1734054678.836:1383): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:51:19.463000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:19.463000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c010aec180 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:51:19.506796 kernel: audit: type=1400 audit(1734054679.463:1385): avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:19.507145 kernel: audit: type=1300 audit(1734054679.463:1385): arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c010aec180 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:51:19.507191 kernel: audit: type=1327 audit(1734054679.463:1385): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:51:19.463000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:51:19.465000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:19.548555 kernel: audit: type=1400 audit(1734054679.465:1386): avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:19.465000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c010aec270 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:51:19.465000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:51:19.484000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:19.484000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00d1157e0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:51:19.484000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:51:19.538000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:19.538000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c010b27920 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:51:19.538000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:51:19.562000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:19.562000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:19.562000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=71 a1=c00d115840 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:51:19.562000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c010b27a10 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:51:19.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:51:19.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:51:22.659321 systemd[1]: run-containerd-runc-k8s.io-2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525-runc.gnsBEw.mount: Deactivated successfully. Dec 13 01:51:23.579000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:23.579000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:23.579000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c000367de0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:51:23.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:51:23.579000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001805480 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:51:23.579000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:51:23.580000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:23.580000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001805800 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:51:23.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:51:23.583000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:51:23.583000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c000367e00 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:51:23.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:51:25.516438 systemd[1]: run-containerd-runc-k8s.io-74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69-runc.dmqTq8.mount: Deactivated successfully. Dec 13 01:51:36.460613 systemd[1]: run-containerd-runc-k8s.io-2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525-runc.HqZyx4.mount: Deactivated successfully. Dec 13 01:51:53.525156 systemd[1]: Started sshd@7-10.200.8.26:22-10.200.16.10:41764.service. Dec 13 01:51:53.558025 kernel: kauditd_printk_skb: 26 callbacks suppressed Dec 13 01:51:53.558182 kernel: audit: type=1130 audit(1734054713.524:1395): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.26:22-10.200.16.10:41764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:51:53.524000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.26:22-10.200.16.10:41764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:51:54.165820 sshd[5190]: Accepted publickey for core from 10.200.16.10 port 41764 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:51:54.164000 audit[5190]: USER_ACCT pid=5190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.169873 sshd[5190]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:51:54.190748 kernel: audit: type=1101 audit(1734054714.164:1396): pid=5190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.166000 audit[5190]: CRED_ACQ pid=5190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.215960 systemd[1]: Started session-10.scope. Dec 13 01:51:54.236137 kernel: audit: type=1103 audit(1734054714.166:1397): pid=5190 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.236322 kernel: audit: type=1006 audit(1734054714.166:1398): pid=5190 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=10 res=1 Dec 13 01:51:54.219236 systemd-logind[1399]: New session 10 of user core. Dec 13 01:51:54.166000 audit[5190]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc995b3bf0 a2=3 a3=0 items=0 ppid=1 pid=5190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:51:54.166000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:51:54.265504 kernel: audit: type=1300 audit(1734054714.166:1398): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc995b3bf0 a2=3 a3=0 items=0 ppid=1 pid=5190 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=10 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:51:54.265594 kernel: audit: type=1327 audit(1734054714.166:1398): proctitle=737368643A20636F7265205B707269765D Dec 13 01:51:54.242000 audit[5190]: USER_START pid=5190 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.242000 audit[5192]: CRED_ACQ pid=5192 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.301318 kernel: audit: type=1105 audit(1734054714.242:1399): pid=5190 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.301403 kernel: audit: type=1103 audit(1734054714.242:1400): pid=5192 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.695951 sshd[5190]: pam_unix(sshd:session): session closed for user core Dec 13 01:51:54.696000 audit[5190]: USER_END pid=5190 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.699048 systemd[1]: sshd@7-10.200.8.26:22-10.200.16.10:41764.service: Deactivated successfully. Dec 13 01:51:54.699964 systemd[1]: session-10.scope: Deactivated successfully. Dec 13 01:51:54.709570 systemd-logind[1399]: Session 10 logged out. Waiting for processes to exit. Dec 13 01:51:54.710499 systemd-logind[1399]: Removed session 10. Dec 13 01:51:54.696000 audit[5190]: CRED_DISP pid=5190 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.732616 kernel: audit: type=1106 audit(1734054714.696:1401): pid=5190 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.732692 kernel: audit: type=1104 audit(1734054714.696:1402): pid=5190 uid=0 auid=500 ses=10 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:51:54.698000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@7-10.200.8.26:22-10.200.16.10:41764 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:51:55.524167 systemd[1]: run-containerd-runc-k8s.io-74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69-runc.lQzH3V.mount: Deactivated successfully. Dec 13 01:51:59.800000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.26:22-10.200.16.10:59766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:51:59.801548 systemd[1]: Started sshd@8-10.200.8.26:22-10.200.16.10:59766.service. Dec 13 01:51:59.809927 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:51:59.810018 kernel: audit: type=1130 audit(1734054719.800:1404): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.26:22-10.200.16.10:59766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:00.428000 audit[5229]: USER_ACCT pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.430744 sshd[5229]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:00.455843 sshd[5229]: Accepted publickey for core from 10.200.16.10 port 59766 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:00.456044 kernel: audit: type=1101 audit(1734054720.428:1405): pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.428000 audit[5229]: CRED_ACQ pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.471632 systemd[1]: Started session-11.scope. Dec 13 01:52:00.472262 systemd-logind[1399]: New session 11 of user core. Dec 13 01:52:00.480554 kernel: audit: type=1103 audit(1734054720.428:1406): pid=5229 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.480621 kernel: audit: type=1006 audit(1734054720.428:1407): pid=5229 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=11 res=1 Dec 13 01:52:00.489384 kernel: audit: type=1300 audit(1734054720.428:1407): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb670bf90 a2=3 a3=0 items=0 ppid=1 pid=5229 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:00.428000 audit[5229]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdb670bf90 a2=3 a3=0 items=0 ppid=1 pid=5229 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=11 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:00.428000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:00.510731 kernel: audit: type=1327 audit(1734054720.428:1407): proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:00.479000 audit[5229]: USER_START pid=5229 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.517041 kernel: audit: type=1105 audit(1734054720.479:1408): pid=5229 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.481000 audit[5231]: CRED_ACQ pid=5231 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.538940 kernel: audit: type=1103 audit(1734054720.481:1409): pid=5231 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.941982 sshd[5229]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:00.942000 audit[5229]: USER_END pid=5229 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.945754 systemd[1]: sshd@8-10.200.8.26:22-10.200.16.10:59766.service: Deactivated successfully. Dec 13 01:52:00.946547 systemd[1]: session-11.scope: Deactivated successfully. Dec 13 01:52:00.948427 systemd-logind[1399]: Session 11 logged out. Waiting for processes to exit. Dec 13 01:52:00.949345 systemd-logind[1399]: Removed session 11. Dec 13 01:52:00.942000 audit[5229]: CRED_DISP pid=5229 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.984701 kernel: audit: type=1106 audit(1734054720.942:1410): pid=5229 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.984789 kernel: audit: type=1104 audit(1734054720.942:1411): pid=5229 uid=0 auid=500 ses=11 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:00.945000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@8-10.200.8.26:22-10.200.16.10:59766 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:06.048254 systemd[1]: Started sshd@9-10.200.8.26:22-10.200.16.10:59780.service. Dec 13 01:52:06.048000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.26:22-10.200.16.10:59780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:06.053765 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:52:06.053852 kernel: audit: type=1130 audit(1734054726.048:1413): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.26:22-10.200.16.10:59780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:06.455634 systemd[1]: run-containerd-runc-k8s.io-2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525-runc.U2DU3r.mount: Deactivated successfully. Dec 13 01:52:06.674000 audit[5241]: USER_ACCT pid=5241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:06.697048 kernel: audit: type=1101 audit(1734054726.674:1414): pid=5241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:06.697106 sshd[5241]: Accepted publickey for core from 10.200.16.10 port 59780 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:06.695000 audit[5241]: CRED_ACQ pid=5241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:06.697580 sshd[5241]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:06.707992 systemd[1]: Started session-12.scope. Dec 13 01:52:06.708683 systemd-logind[1399]: New session 12 of user core. Dec 13 01:52:06.715962 kernel: audit: type=1103 audit(1734054726.695:1415): pid=5241 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:06.728937 kernel: audit: type=1006 audit(1734054726.696:1416): pid=5241 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=12 res=1 Dec 13 01:52:06.696000 audit[5241]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9235c430 a2=3 a3=0 items=0 ppid=1 pid=5241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:06.696000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:06.751740 kernel: audit: type=1300 audit(1734054726.696:1416): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9235c430 a2=3 a3=0 items=0 ppid=1 pid=5241 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=12 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:06.751809 kernel: audit: type=1327 audit(1734054726.696:1416): proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:06.751837 kernel: audit: type=1105 audit(1734054726.716:1417): pid=5241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:06.716000 audit[5241]: USER_START pid=5241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:06.722000 audit[5261]: CRED_ACQ pid=5261 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:06.785606 kernel: audit: type=1103 audit(1734054726.722:1418): pid=5261 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:07.243303 sshd[5241]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:07.243000 audit[5241]: USER_END pid=5241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:07.258152 systemd[1]: sshd@9-10.200.8.26:22-10.200.16.10:59780.service: Deactivated successfully. Dec 13 01:52:07.258976 systemd[1]: session-12.scope: Deactivated successfully. Dec 13 01:52:07.260655 systemd-logind[1399]: Session 12 logged out. Waiting for processes to exit. Dec 13 01:52:07.267391 systemd-logind[1399]: Removed session 12. Dec 13 01:52:07.277048 kernel: audit: type=1106 audit(1734054727.243:1419): pid=5241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:07.244000 audit[5241]: CRED_DISP pid=5241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:07.255000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@9-10.200.8.26:22-10.200.16.10:59780 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:07.296046 kernel: audit: type=1104 audit(1734054727.244:1420): pid=5241 uid=0 auid=500 ses=12 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:09.676000 audit[4483]: AVC avc: denied { watch } for pid=4483 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.2609799091/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c922 tclass=file permissive=0 Dec 13 01:52:09.676000 audit[4483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002306000 a2=fc6 a3=0 items=0 ppid=3984 pid=4483 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 key=(null) Dec 13 01:52:09.676000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:52:10.349000 audit[4521]: AVC avc: denied { watch } for pid=4521 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.37738128/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c587,c877 tclass=file permissive=0 Dec 13 01:52:10.349000 audit[4521]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e304e0 a2=fc6 a3=0 items=0 ppid=4134 pid=4521 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 key=(null) Dec 13 01:52:10.349000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:52:12.371520 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 01:52:12.371673 kernel: audit: type=1130 audit(1734054732.348:1424): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.26:22-10.200.16.10:38068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:12.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.26:22-10.200.16.10:38068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:12.349588 systemd[1]: Started sshd@10-10.200.8.26:22-10.200.16.10:38068.service. Dec 13 01:52:12.979000 audit[5271]: USER_ACCT pid=5271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.001549 sshd[5271]: Accepted publickey for core from 10.200.16.10 port 38068 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:13.001931 kernel: audit: type=1101 audit(1734054732.979:1425): pid=5271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.003000 audit[5271]: CRED_ACQ pid=5271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.006211 sshd[5271]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:13.012533 systemd[1]: Started session-13.scope. Dec 13 01:52:13.013008 systemd-logind[1399]: New session 13 of user core. Dec 13 01:52:13.022948 kernel: audit: type=1103 audit(1734054733.003:1426): pid=5271 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.037968 kernel: audit: type=1006 audit(1734054733.003:1427): pid=5271 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=13 res=1 Dec 13 01:52:13.003000 audit[5271]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc73ec4dd0 a2=3 a3=0 items=0 ppid=1 pid=5271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:13.072328 kernel: audit: type=1300 audit(1734054733.003:1427): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffc73ec4dd0 a2=3 a3=0 items=0 ppid=1 pid=5271 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=13 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:13.072474 kernel: audit: type=1327 audit(1734054733.003:1427): proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:13.003000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:13.019000 audit[5271]: USER_START pid=5271 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.096603 kernel: audit: type=1105 audit(1734054733.019:1428): pid=5271 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.097087 kernel: audit: type=1103 audit(1734054733.023:1429): pid=5273 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.023000 audit[5273]: CRED_ACQ pid=5273 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.498419 sshd[5271]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:13.498000 audit[5271]: USER_END pid=5271 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.507234 systemd[1]: sshd@10-10.200.8.26:22-10.200.16.10:38068.service: Deactivated successfully. Dec 13 01:52:13.507934 systemd[1]: session-13.scope: Deactivated successfully. Dec 13 01:52:13.509295 systemd-logind[1399]: Session 13 logged out. Waiting for processes to exit. Dec 13 01:52:13.510133 systemd-logind[1399]: Removed session 13. Dec 13 01:52:13.530938 kernel: audit: type=1106 audit(1734054733.498:1430): pid=5271 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.531038 kernel: audit: type=1104 audit(1734054733.499:1431): pid=5271 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.499000 audit[5271]: CRED_DISP pid=5271 uid=0 auid=500 ses=13 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:13.506000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@10-10.200.8.26:22-10.200.16.10:38068 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:13.603577 systemd[1]: Started sshd@11-10.200.8.26:22-10.200.16.10:38070.service. Dec 13 01:52:13.603000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.26:22-10.200.16.10:38070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:14.230000 audit[5283]: USER_ACCT pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:14.231416 sshd[5283]: Accepted publickey for core from 10.200.16.10 port 38070 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:14.231000 audit[5283]: CRED_ACQ pid=5283 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:14.231000 audit[5283]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff8a6c5700 a2=3 a3=0 items=0 ppid=1 pid=5283 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=14 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:14.231000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:14.232849 sshd[5283]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:14.237801 systemd[1]: Started session-14.scope. Dec 13 01:52:14.238512 systemd-logind[1399]: New session 14 of user core. Dec 13 01:52:14.242000 audit[5283]: USER_START pid=5283 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:14.243000 audit[5285]: CRED_ACQ pid=5285 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:14.770343 sshd[5283]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:14.770000 audit[5283]: USER_END pid=5283 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:14.771000 audit[5283]: CRED_DISP pid=5283 uid=0 auid=500 ses=14 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:14.773000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@11-10.200.8.26:22-10.200.16.10:38070 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:14.774072 systemd-logind[1399]: Session 14 logged out. Waiting for processes to exit. Dec 13 01:52:14.774315 systemd[1]: sshd@11-10.200.8.26:22-10.200.16.10:38070.service: Deactivated successfully. Dec 13 01:52:14.775539 systemd[1]: session-14.scope: Deactivated successfully. Dec 13 01:52:14.777446 systemd-logind[1399]: Removed session 14. Dec 13 01:52:14.878000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.26:22-10.200.16.10:38076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:14.878787 systemd[1]: Started sshd@12-10.200.8.26:22-10.200.16.10:38076.service. Dec 13 01:52:15.500000 audit[5292]: USER_ACCT pid=5292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:15.501996 sshd[5292]: Accepted publickey for core from 10.200.16.10 port 38076 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:15.502000 audit[5292]: CRED_ACQ pid=5292 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:15.502000 audit[5292]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe7226e5d0 a2=3 a3=0 items=0 ppid=1 pid=5292 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=15 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:15.502000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:15.503733 sshd[5292]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:15.508812 systemd-logind[1399]: New session 15 of user core. Dec 13 01:52:15.509524 systemd[1]: Started session-15.scope. Dec 13 01:52:15.513000 audit[5292]: USER_START pid=5292 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:15.515000 audit[5294]: CRED_ACQ pid=5294 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:16.006625 sshd[5292]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:16.007000 audit[5292]: USER_END pid=5292 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:16.007000 audit[5292]: CRED_DISP pid=5292 uid=0 auid=500 ses=15 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:16.010158 systemd[1]: sshd@12-10.200.8.26:22-10.200.16.10:38076.service: Deactivated successfully. Dec 13 01:52:16.009000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@12-10.200.8.26:22-10.200.16.10:38076 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:16.011361 systemd[1]: session-15.scope: Deactivated successfully. Dec 13 01:52:16.012191 systemd-logind[1399]: Session 15 logged out. Waiting for processes to exit. Dec 13 01:52:16.013063 systemd-logind[1399]: Removed session 15. Dec 13 01:52:18.840000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:18.847651 kernel: kauditd_printk_skb: 23 callbacks suppressed Dec 13 01:52:18.847978 kernel: audit: type=1400 audit(1734054738.840:1451): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:18.841000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:18.890707 kernel: audit: type=1400 audit(1734054738.841:1452): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:18.892002 kernel: audit: type=1300 audit(1734054738.841:1452): arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002989d00 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:52:18.841000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002989d00 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:52:18.841000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:52:18.840000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016afef0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:52:18.978518 kernel: audit: type=1327 audit(1734054738.841:1452): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:52:18.978605 kernel: audit: type=1300 audit(1734054738.840:1451): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c0016afef0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:52:18.978629 kernel: audit: type=1327 audit(1734054738.840:1451): proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:52:18.840000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:52:19.465000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:19.465000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:19.518037 kernel: audit: type=1400 audit(1734054739.465:1453): avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:19.518326 kernel: audit: type=1400 audit(1734054739.465:1454): avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:19.518369 kernel: audit: type=1300 audit(1734054739.465:1453): arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c006b41ad0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:52:19.465000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c006b41ad0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:52:19.465000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:52:19.560809 kernel: audit: type=1327 audit(1734054739.465:1453): proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:52:19.465000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=70 a1=c00ad1a3f0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:52:19.465000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:52:19.483000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:19.483000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c0040e7ac0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:52:19.483000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:52:19.538000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:19.538000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c003a62630 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:52:19.538000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:52:19.562000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:19.562000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:19.562000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=67 a1=c0004fcb40 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:52:19.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:52:19.562000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=66 a1=c007910fe0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:52:19.562000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:52:21.111836 systemd[1]: Started sshd@13-10.200.8.26:22-10.200.16.10:42802.service. Dec 13 01:52:21.111000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.26:22-10.200.16.10:42802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:21.735000 audit[5308]: USER_ACCT pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:21.736811 sshd[5308]: Accepted publickey for core from 10.200.16.10 port 42802 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:21.738000 audit[5308]: CRED_ACQ pid=5308 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:21.738000 audit[5308]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb0a17560 a2=3 a3=0 items=0 ppid=1 pid=5308 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=16 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:21.738000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:21.740083 sshd[5308]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:21.745020 systemd-logind[1399]: New session 16 of user core. Dec 13 01:52:21.745363 systemd[1]: Started session-16.scope. Dec 13 01:52:21.751000 audit[5308]: USER_START pid=5308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:21.753000 audit[5310]: CRED_ACQ pid=5310 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:22.243949 sshd[5308]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:22.244000 audit[5308]: USER_END pid=5308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:22.245000 audit[5308]: CRED_DISP pid=5308 uid=0 auid=500 ses=16 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:22.247598 systemd[1]: sshd@13-10.200.8.26:22-10.200.16.10:42802.service: Deactivated successfully. Dec 13 01:52:22.247000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@13-10.200.8.26:22-10.200.16.10:42802 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:22.248871 systemd[1]: session-16.scope: Deactivated successfully. Dec 13 01:52:22.249718 systemd-logind[1399]: Session 16 logged out. Waiting for processes to exit. Dec 13 01:52:22.250713 systemd-logind[1399]: Removed session 16. Dec 13 01:52:22.662974 systemd[1]: run-containerd-runc-k8s.io-2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525-runc.O3jM1F.mount: Deactivated successfully. Dec 13 01:52:23.580000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:23.580000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:23.580000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ba05a0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:52:23.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:52:23.581000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:23.581000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=b a1=c002ba05c0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:52:23.581000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:52:23.580000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002c48280 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:52:23.580000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:52:23.583000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:52:23.583000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c002ba0a60 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:52:23.583000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:52:25.514310 systemd[1]: run-containerd-runc-k8s.io-74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69-runc.JJwbK5.mount: Deactivated successfully. Dec 13 01:52:27.348372 systemd[1]: Started sshd@14-10.200.8.26:22-10.200.16.10:42814.service. Dec 13 01:52:27.348000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.26:22-10.200.16.10:42814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:27.364031 kernel: kauditd_printk_skb: 37 callbacks suppressed Dec 13 01:52:27.364133 kernel: audit: type=1130 audit(1734054747.348:1472): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.26:22-10.200.16.10:42814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:27.976000 audit[5363]: USER_ACCT pid=5363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.000458 sshd[5363]: Accepted publickey for core from 10.200.16.10 port 42814 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:28.000925 kernel: audit: type=1101 audit(1734054747.976:1473): pid=5363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.001031 sshd[5363]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:27.999000 audit[5363]: CRED_ACQ pid=5363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.008164 systemd[1]: Started session-17.scope. Dec 13 01:52:28.009269 systemd-logind[1399]: New session 17 of user core. Dec 13 01:52:28.029035 kernel: audit: type=1103 audit(1734054747.999:1474): pid=5363 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.029341 kernel: audit: type=1006 audit(1734054747.999:1475): pid=5363 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=17 res=1 Dec 13 01:52:28.029402 kernel: audit: type=1300 audit(1734054747.999:1475): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd99dae410 a2=3 a3=0 items=0 ppid=1 pid=5363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:27.999000 audit[5363]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffd99dae410 a2=3 a3=0 items=0 ppid=1 pid=5363 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=17 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:27.999000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:28.052174 kernel: audit: type=1327 audit(1734054747.999:1475): proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:28.053929 kernel: audit: type=1105 audit(1734054748.013:1476): pid=5363 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.013000 audit[5363]: USER_START pid=5363 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.079756 kernel: audit: type=1103 audit(1734054748.015:1477): pid=5365 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.015000 audit[5365]: CRED_ACQ pid=5365 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.480953 sshd[5363]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:28.481000 audit[5363]: USER_END pid=5363 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.489320 systemd[1]: sshd@14-10.200.8.26:22-10.200.16.10:42814.service: Deactivated successfully. Dec 13 01:52:28.490011 systemd[1]: session-17.scope: Deactivated successfully. Dec 13 01:52:28.493460 systemd-logind[1399]: Session 17 logged out. Waiting for processes to exit. Dec 13 01:52:28.494604 systemd-logind[1399]: Removed session 17. Dec 13 01:52:28.506931 kernel: audit: type=1106 audit(1734054748.481:1478): pid=5363 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.485000 audit[5363]: CRED_DISP pid=5363 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:28.488000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@14-10.200.8.26:22-10.200.16.10:42814 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:28.524010 kernel: audit: type=1104 audit(1734054748.485:1479): pid=5363 uid=0 auid=500 ses=17 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:33.586000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.26:22-10.200.16.10:60478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:33.611505 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:52:33.611602 kernel: audit: type=1130 audit(1734054753.586:1481): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.26:22-10.200.16.10:60478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:33.587541 systemd[1]: Started sshd@15-10.200.8.26:22-10.200.16.10:60478.service. Dec 13 01:52:34.212000 audit[5379]: USER_ACCT pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.216282 sshd[5379]: Accepted publickey for core from 10.200.16.10 port 60478 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:34.234938 kernel: audit: type=1101 audit(1734054754.212:1482): pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.233000 audit[5379]: CRED_ACQ pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.235225 sshd[5379]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:34.241513 systemd[1]: Started session-18.scope. Dec 13 01:52:34.242930 systemd-logind[1399]: New session 18 of user core. Dec 13 01:52:34.254010 kernel: audit: type=1103 audit(1734054754.233:1483): pid=5379 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.233000 audit[5379]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff37346080 a2=3 a3=0 items=0 ppid=1 pid=5379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:34.271104 kernel: audit: type=1006 audit(1734054754.233:1484): pid=5379 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=18 res=1 Dec 13 01:52:34.271142 kernel: audit: type=1300 audit(1734054754.233:1484): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff37346080 a2=3 a3=0 items=0 ppid=1 pid=5379 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=18 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:34.233000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:34.295339 kernel: audit: type=1327 audit(1734054754.233:1484): proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:34.295419 kernel: audit: type=1105 audit(1734054754.256:1485): pid=5379 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.256000 audit[5379]: USER_START pid=5379 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.259000 audit[5384]: CRED_ACQ pid=5384 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.334075 kernel: audit: type=1103 audit(1734054754.259:1486): pid=5384 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.728145 sshd[5379]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:34.728000 audit[5379]: USER_END pid=5379 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.736363 systemd[1]: sshd@15-10.200.8.26:22-10.200.16.10:60478.service: Deactivated successfully. Dec 13 01:52:34.737222 systemd[1]: session-18.scope: Deactivated successfully. Dec 13 01:52:34.744396 systemd-logind[1399]: Session 18 logged out. Waiting for processes to exit. Dec 13 01:52:34.745310 systemd-logind[1399]: Removed session 18. Dec 13 01:52:34.757125 kernel: audit: type=1106 audit(1734054754.728:1487): pid=5379 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.734000 audit[5379]: CRED_DISP pid=5379 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.734000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@15-10.200.8.26:22-10.200.16.10:60478 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:34.778927 kernel: audit: type=1104 audit(1734054754.734:1488): pid=5379 uid=0 auid=500 ses=18 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:34.832823 systemd[1]: Started sshd@16-10.200.8.26:22-10.200.16.10:60484.service. Dec 13 01:52:34.832000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.26:22-10.200.16.10:60484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:35.455000 audit[5394]: USER_ACCT pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:35.457031 sshd[5394]: Accepted publickey for core from 10.200.16.10 port 60484 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:35.457000 audit[5394]: CRED_ACQ pid=5394 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:35.457000 audit[5394]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffac80fdf0 a2=3 a3=0 items=0 ppid=1 pid=5394 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=19 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:35.457000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:35.458712 sshd[5394]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:35.465197 systemd-logind[1399]: New session 19 of user core. Dec 13 01:52:35.465681 systemd[1]: Started session-19.scope. Dec 13 01:52:35.469000 audit[5394]: USER_START pid=5394 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:35.471000 audit[5396]: CRED_ACQ pid=5396 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:36.027179 sshd[5394]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:36.027000 audit[5394]: USER_END pid=5394 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:36.027000 audit[5394]: CRED_DISP pid=5394 uid=0 auid=500 ses=19 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:36.030380 systemd[1]: sshd@16-10.200.8.26:22-10.200.16.10:60484.service: Deactivated successfully. Dec 13 01:52:36.029000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@16-10.200.8.26:22-10.200.16.10:60484 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:36.032000 systemd-logind[1399]: Session 19 logged out. Waiting for processes to exit. Dec 13 01:52:36.032044 systemd[1]: session-19.scope: Deactivated successfully. Dec 13 01:52:36.034029 systemd-logind[1399]: Removed session 19. Dec 13 01:52:36.130000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.26:22-10.200.16.10:60486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:36.131102 systemd[1]: Started sshd@17-10.200.8.26:22-10.200.16.10:60486.service. Dec 13 01:52:36.458624 systemd[1]: run-containerd-runc-k8s.io-2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525-runc.r1On5x.mount: Deactivated successfully. Dec 13 01:52:36.755000 audit[5404]: USER_ACCT pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:36.756560 sshd[5404]: Accepted publickey for core from 10.200.16.10 port 60486 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:36.756000 audit[5404]: CRED_ACQ pid=5404 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:36.757000 audit[5404]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe121b1610 a2=3 a3=0 items=0 ppid=1 pid=5404 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=20 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:36.757000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:36.758401 sshd[5404]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:36.764465 systemd[1]: Started session-20.scope. Dec 13 01:52:36.764931 systemd-logind[1399]: New session 20 of user core. Dec 13 01:52:36.768000 audit[5404]: USER_START pid=5404 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:36.770000 audit[5426]: CRED_ACQ pid=5426 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:38.927000 audit[5436]: NETFILTER_CFG table=filter:127 family=2 entries=20 op=nft_register_rule pid=5436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:38.933511 kernel: kauditd_printk_skb: 20 callbacks suppressed Dec 13 01:52:38.933595 kernel: audit: type=1325 audit(1734054758.927:1505): table=filter:127 family=2 entries=20 op=nft_register_rule pid=5436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:38.952676 kernel: audit: type=1300 audit(1734054758.927:1505): arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffee319bda0 a2=0 a3=7ffee319bd8c items=0 ppid=2621 pid=5436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:38.927000 audit[5436]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffee319bda0 a2=0 a3=7ffee319bd8c items=0 ppid=2621 pid=5436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:38.927000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:38.998418 kernel: audit: type=1327 audit(1734054758.927:1505): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:38.961000 audit[5436]: NETFILTER_CFG table=nat:128 family=2 entries=22 op=nft_register_rule pid=5436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:38.961000 audit[5436]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffee319bda0 a2=0 a3=0 items=0 ppid=2621 pid=5436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:39.043659 kernel: audit: type=1325 audit(1734054758.961:1506): table=nat:128 family=2 entries=22 op=nft_register_rule pid=5436 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:39.043765 kernel: audit: type=1300 audit(1734054758.961:1506): arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffee319bda0 a2=0 a3=0 items=0 ppid=2621 pid=5436 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:38.961000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:39.056210 sshd[5404]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:39.058072 kernel: audit: type=1327 audit(1734054758.961:1506): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:39.057000 audit[5404]: USER_END pid=5404 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:39.060688 systemd[1]: sshd@17-10.200.8.26:22-10.200.16.10:60486.service: Deactivated successfully. Dec 13 01:52:39.061433 systemd[1]: session-20.scope: Deactivated successfully. Dec 13 01:52:39.067077 systemd-logind[1399]: Session 20 logged out. Waiting for processes to exit. Dec 13 01:52:39.068195 systemd-logind[1399]: Removed session 20. Dec 13 01:52:39.078935 kernel: audit: type=1106 audit(1734054759.057:1507): pid=5404 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:39.057000 audit[5404]: CRED_DISP pid=5404 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:39.059000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.26:22-10.200.16.10:60486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:39.133021 kernel: audit: type=1104 audit(1734054759.057:1508): pid=5404 uid=0 auid=500 ses=20 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:39.133192 kernel: audit: type=1131 audit(1734054759.059:1509): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@17-10.200.8.26:22-10.200.16.10:60486 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:39.134968 kernel: audit: type=1325 audit(1734054759.085:1510): table=filter:129 family=2 entries=32 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:39.085000 audit[5439]: NETFILTER_CFG table=filter:129 family=2 entries=32 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:39.085000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=11944 a0=3 a1=7ffef57f06a0 a2=0 a3=7ffef57f068c items=0 ppid=2621 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:39.085000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:39.146000 audit[5439]: NETFILTER_CFG table=nat:130 family=2 entries=22 op=nft_register_rule pid=5439 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:39.146000 audit[5439]: SYSCALL arch=c000003e syscall=46 success=yes exit=6540 a0=3 a1=7ffef57f06a0 a2=0 a3=0 items=0 ppid=2621 pid=5439 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:39.146000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:39.161000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.26:22-10.200.16.10:35500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:39.162135 systemd[1]: Started sshd@18-10.200.8.26:22-10.200.16.10:35500.service. Dec 13 01:52:39.784000 audit[5442]: USER_ACCT pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:39.785250 sshd[5442]: Accepted publickey for core from 10.200.16.10 port 35500 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:39.785000 audit[5442]: CRED_ACQ pid=5442 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:39.785000 audit[5442]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffb0b29360 a2=3 a3=0 items=0 ppid=1 pid=5442 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=21 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:39.785000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:39.787055 sshd[5442]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:39.792675 systemd[1]: Started session-21.scope. Dec 13 01:52:39.793294 systemd-logind[1399]: New session 21 of user core. Dec 13 01:52:39.796000 audit[5442]: USER_START pid=5442 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:39.798000 audit[5444]: CRED_ACQ pid=5444 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:40.385822 sshd[5442]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:40.386000 audit[5442]: USER_END pid=5442 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:40.386000 audit[5442]: CRED_DISP pid=5442 uid=0 auid=500 ses=21 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:40.389694 systemd[1]: sshd@18-10.200.8.26:22-10.200.16.10:35500.service: Deactivated successfully. Dec 13 01:52:40.389000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@18-10.200.8.26:22-10.200.16.10:35500 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:40.390735 systemd[1]: session-21.scope: Deactivated successfully. Dec 13 01:52:40.391467 systemd-logind[1399]: Session 21 logged out. Waiting for processes to exit. Dec 13 01:52:40.392281 systemd-logind[1399]: Removed session 21. Dec 13 01:52:40.491000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.26:22-10.200.16.10:35504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:40.491984 systemd[1]: Started sshd@19-10.200.8.26:22-10.200.16.10:35504.service. Dec 13 01:52:41.113000 audit[5458]: USER_ACCT pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:41.114835 sshd[5458]: Accepted publickey for core from 10.200.16.10 port 35504 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:41.115000 audit[5458]: CRED_ACQ pid=5458 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:41.115000 audit[5458]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffca8513360 a2=3 a3=0 items=0 ppid=1 pid=5458 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=22 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:41.115000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:41.116616 sshd[5458]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:41.121778 systemd[1]: Started session-22.scope. Dec 13 01:52:41.122259 systemd-logind[1399]: New session 22 of user core. Dec 13 01:52:41.125000 audit[5458]: USER_START pid=5458 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:41.127000 audit[5460]: CRED_ACQ pid=5460 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:41.610838 sshd[5458]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:41.611000 audit[5458]: USER_END pid=5458 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:41.611000 audit[5458]: CRED_DISP pid=5458 uid=0 auid=500 ses=22 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:41.613922 systemd[1]: sshd@19-10.200.8.26:22-10.200.16.10:35504.service: Deactivated successfully. Dec 13 01:52:41.613000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@19-10.200.8.26:22-10.200.16.10:35504 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:41.615127 systemd[1]: session-22.scope: Deactivated successfully. Dec 13 01:52:41.615812 systemd-logind[1399]: Session 22 logged out. Waiting for processes to exit. Dec 13 01:52:41.616704 systemd-logind[1399]: Removed session 22. Dec 13 01:52:46.232000 audit[5470]: NETFILTER_CFG table=filter:131 family=2 entries=20 op=nft_register_rule pid=5470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:46.239102 kernel: kauditd_printk_skb: 27 callbacks suppressed Dec 13 01:52:46.240548 kernel: audit: type=1325 audit(1734054766.232:1530): table=filter:131 family=2 entries=20 op=nft_register_rule pid=5470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:46.232000 audit[5470]: SYSCALL arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffb5567ce0 a2=0 a3=7fffb5567ccc items=0 ppid=2621 pid=5470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:46.277955 kernel: audit: type=1300 audit(1734054766.232:1530): arch=c000003e syscall=46 success=yes exit=3016 a0=3 a1=7fffb5567ce0 a2=0 a3=7fffb5567ccc items=0 ppid=2621 pid=5470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:46.278072 kernel: audit: type=1327 audit(1734054766.232:1530): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:46.232000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:46.258000 audit[5470]: NETFILTER_CFG table=nat:132 family=2 entries=106 op=nft_register_chain pid=5470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:46.298402 kernel: audit: type=1325 audit(1734054766.258:1531): table=nat:132 family=2 entries=106 op=nft_register_chain pid=5470 subj=system_u:system_r:kernel_t:s0 comm="iptables-restor" Dec 13 01:52:46.298500 kernel: audit: type=1300 audit(1734054766.258:1531): arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffb5567ce0 a2=0 a3=7fffb5567ccc items=0 ppid=2621 pid=5470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:46.258000 audit[5470]: SYSCALL arch=c000003e syscall=46 success=yes exit=49452 a0=3 a1=7fffb5567ce0 a2=0 a3=7fffb5567ccc items=0 ppid=2621 pid=5470 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="iptables-restor" exe="/usr/sbin/xtables-nft-multi" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:46.258000 audit: PROCTITLE proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:46.331199 kernel: audit: type=1327 audit(1734054766.258:1531): proctitle=69707461626C65732D726573746F7265002D770035002D5700313030303030002D2D6E6F666C757368002D2D636F756E74657273 Dec 13 01:52:46.715000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.26:22-10.200.16.10:35512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:46.716326 systemd[1]: Started sshd@20-10.200.8.26:22-10.200.16.10:35512.service. Dec 13 01:52:46.741010 kernel: audit: type=1130 audit(1734054766.715:1532): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.26:22-10.200.16.10:35512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:47.343000 audit[5473]: USER_ACCT pid=5473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:47.348425 sshd[5473]: Accepted publickey for core from 10.200.16.10 port 35512 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:47.370949 kernel: audit: type=1101 audit(1734054767.343:1533): pid=5473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:47.370000 audit[5473]: CRED_ACQ pid=5473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:47.371772 sshd[5473]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:47.377114 systemd[1]: Started session-23.scope. Dec 13 01:52:47.378419 systemd-logind[1399]: New session 23 of user core. Dec 13 01:52:47.388930 kernel: audit: type=1103 audit(1734054767.370:1534): pid=5473 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:47.389003 kernel: audit: type=1006 audit(1734054767.370:1535): pid=5473 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=23 res=1 Dec 13 01:52:47.370000 audit[5473]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fffd7c485b0 a2=3 a3=0 items=0 ppid=1 pid=5473 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=23 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:47.370000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:47.383000 audit[5473]: USER_START pid=5473 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:47.385000 audit[5477]: CRED_ACQ pid=5477 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:47.849311 sshd[5473]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:47.849000 audit[5473]: USER_END pid=5473 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:47.850000 audit[5473]: CRED_DISP pid=5473 uid=0 auid=500 ses=23 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:47.852725 systemd[1]: sshd@20-10.200.8.26:22-10.200.16.10:35512.service: Deactivated successfully. Dec 13 01:52:47.852000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@20-10.200.8.26:22-10.200.16.10:35512 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:47.853953 systemd[1]: session-23.scope: Deactivated successfully. Dec 13 01:52:47.854772 systemd-logind[1399]: Session 23 logged out. Waiting for processes to exit. Dec 13 01:52:47.855686 systemd-logind[1399]: Removed session 23. Dec 13 01:52:52.954948 systemd[1]: Started sshd@21-10.200.8.26:22-10.200.16.10:40204.service. Dec 13 01:52:52.954000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.26:22-10.200.16.10:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:52.961706 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 01:52:52.962339 kernel: audit: type=1130 audit(1734054772.954:1541): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.26:22-10.200.16.10:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:53.585000 audit[5487]: USER_ACCT pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:53.589225 sshd[5487]: Accepted publickey for core from 10.200.16.10 port 40204 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:53.609879 sshd[5487]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:53.610202 kernel: audit: type=1101 audit(1734054773.585:1542): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:53.610243 kernel: audit: type=1103 audit(1734054773.608:1543): pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:53.608000 audit[5487]: CRED_ACQ pid=5487 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:53.615627 systemd[1]: Started session-24.scope. Dec 13 01:52:53.616618 systemd-logind[1399]: New session 24 of user core. Dec 13 01:52:53.627930 kernel: audit: type=1006 audit(1734054773.608:1544): pid=5487 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=24 res=1 Dec 13 01:52:53.608000 audit[5487]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0365df80 a2=3 a3=0 items=0 ppid=1 pid=5487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:53.638960 kernel: audit: type=1300 audit(1734054773.608:1544): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7fff0365df80 a2=3 a3=0 items=0 ppid=1 pid=5487 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=24 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:53.657242 kernel: audit: type=1327 audit(1734054773.608:1544): proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:53.608000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:53.621000 audit[5487]: USER_START pid=5487 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:53.663935 kernel: audit: type=1105 audit(1734054773.621:1545): pid=5487 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:53.623000 audit[5489]: CRED_ACQ pid=5489 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:53.706726 kernel: audit: type=1103 audit(1734054773.623:1546): pid=5489 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:54.095287 sshd[5487]: pam_unix(sshd:session): session closed for user core Dec 13 01:52:54.097000 audit[5487]: USER_END pid=5487 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:54.101176 systemd[1]: sshd@21-10.200.8.26:22-10.200.16.10:40204.service: Deactivated successfully. Dec 13 01:52:54.101865 systemd[1]: session-24.scope: Deactivated successfully. Dec 13 01:52:54.102970 systemd-logind[1399]: Session 24 logged out. Waiting for processes to exit. Dec 13 01:52:54.103763 systemd-logind[1399]: Removed session 24. Dec 13 01:52:54.123942 kernel: audit: type=1106 audit(1734054774.097:1547): pid=5487 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:54.097000 audit[5487]: CRED_DISP pid=5487 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:54.097000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@21-10.200.8.26:22-10.200.16.10:40204 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:54.147928 kernel: audit: type=1104 audit(1734054774.097:1548): pid=5487 uid=0 auid=500 ses=24 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:55.516883 systemd[1]: run-containerd-runc-k8s.io-74fd8f9f3af2543706c0d233752211ab0a6a32e5654d3af0069cb06484cabe69-runc.kIlXon.mount: Deactivated successfully. Dec 13 01:52:59.200143 systemd[1]: Started sshd@22-10.200.8.26:22-10.200.16.10:40352.service. Dec 13 01:52:59.222958 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:52:59.223075 kernel: audit: type=1130 audit(1734054779.200:1550): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.26:22-10.200.16.10:40352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:59.200000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.26:22-10.200.16.10:40352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:52:59.827000 audit[5524]: USER_ACCT pid=5524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:59.828204 sshd[5524]: Accepted publickey for core from 10.200.16.10 port 40352 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:52:59.848000 audit[5524]: CRED_ACQ pid=5524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:59.849979 sshd[5524]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:52:59.855212 systemd[1]: Started session-25.scope. Dec 13 01:52:59.856339 systemd-logind[1399]: New session 25 of user core. Dec 13 01:52:59.866384 kernel: audit: type=1101 audit(1734054779.827:1551): pid=5524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:59.866473 kernel: audit: type=1103 audit(1734054779.848:1552): pid=5524 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:59.876684 kernel: audit: type=1006 audit(1734054779.848:1553): pid=5524 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=25 res=1 Dec 13 01:52:59.848000 audit[5524]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9315ff80 a2=3 a3=0 items=0 ppid=1 pid=5524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:59.894061 kernel: audit: type=1300 audit(1734054779.848:1553): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffe9315ff80 a2=3 a3=0 items=0 ppid=1 pid=5524 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=25 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:52:59.848000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:59.899947 kernel: audit: type=1327 audit(1734054779.848:1553): proctitle=737368643A20636F7265205B707269765D Dec 13 01:52:59.861000 audit[5524]: USER_START pid=5524 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:59.900932 kernel: audit: type=1105 audit(1734054779.861:1554): pid=5524 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:59.863000 audit[5526]: CRED_ACQ pid=5526 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:52:59.933730 kernel: audit: type=1103 audit(1734054779.863:1555): pid=5526 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:00.324022 sshd[5524]: pam_unix(sshd:session): session closed for user core Dec 13 01:53:00.324000 audit[5524]: USER_END pid=5524 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:00.331625 systemd[1]: sshd@22-10.200.8.26:22-10.200.16.10:40352.service: Deactivated successfully. Dec 13 01:53:00.332459 systemd[1]: session-25.scope: Deactivated successfully. Dec 13 01:53:00.339264 systemd-logind[1399]: Session 25 logged out. Waiting for processes to exit. Dec 13 01:53:00.340065 systemd-logind[1399]: Removed session 25. Dec 13 01:53:00.327000 audit[5524]: CRED_DISP pid=5524 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:00.370926 kernel: audit: type=1106 audit(1734054780.324:1556): pid=5524 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:00.371036 kernel: audit: type=1104 audit(1734054780.327:1557): pid=5524 uid=0 auid=500 ses=25 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:00.330000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@22-10.200.8.26:22-10.200.16.10:40352 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:05.429000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.26:22-10.200.16.10:40362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:05.429881 systemd[1]: Started sshd@23-10.200.8.26:22-10.200.16.10:40362.service. Dec 13 01:53:05.438515 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:53:05.438617 kernel: audit: type=1130 audit(1734054785.429:1559): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.26:22-10.200.16.10:40362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:06.054000 audit[5540]: USER_ACCT pid=5540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.060492 sshd[5540]: Accepted publickey for core from 10.200.16.10 port 40362 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:53:06.080000 audit[5540]: CRED_ACQ pid=5540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.083534 sshd[5540]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:53:06.094492 systemd[1]: Started session-26.scope. Dec 13 01:53:06.094948 systemd-logind[1399]: New session 26 of user core. Dec 13 01:53:06.115634 kernel: audit: type=1101 audit(1734054786.054:1560): pid=5540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.116767 kernel: audit: type=1103 audit(1734054786.080:1561): pid=5540 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.117293 kernel: audit: type=1006 audit(1734054786.082:1562): pid=5540 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=26 res=1 Dec 13 01:53:06.082000 audit[5540]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfc1f1bd0 a2=3 a3=0 items=0 ppid=1 pid=5540 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:06.148318 kernel: audit: type=1300 audit(1734054786.082:1562): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffcfc1f1bd0 a2=3 a3=0 items=0 ppid=1 pid=5540 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=26 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:06.151447 kernel: audit: type=1327 audit(1734054786.082:1562): proctitle=737368643A20636F7265205B707269765D Dec 13 01:53:06.082000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:53:06.156646 kernel: audit: type=1105 audit(1734054786.106:1563): pid=5540 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.106000 audit[5540]: USER_START pid=5540 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.178784 kernel: audit: type=1103 audit(1734054786.111:1564): pid=5543 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.111000 audit[5543]: CRED_ACQ pid=5543 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.465511 systemd[1]: run-containerd-runc-k8s.io-2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525-runc.75slwN.mount: Deactivated successfully. Dec 13 01:53:06.619977 sshd[5540]: pam_unix(sshd:session): session closed for user core Dec 13 01:53:06.621000 audit[5540]: USER_END pid=5540 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.629537 systemd[1]: sshd@23-10.200.8.26:22-10.200.16.10:40362.service: Deactivated successfully. Dec 13 01:53:06.636438 systemd[1]: session-26.scope: Deactivated successfully. Dec 13 01:53:06.637638 systemd-logind[1399]: Session 26 logged out. Waiting for processes to exit. Dec 13 01:53:06.638483 systemd-logind[1399]: Removed session 26. Dec 13 01:53:06.650371 kernel: audit: type=1106 audit(1734054786.621:1565): pid=5540 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.650451 kernel: audit: type=1104 audit(1734054786.626:1566): pid=5540 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.626000 audit[5540]: CRED_DISP pid=5540 uid=0 auid=500 ses=26 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:06.629000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@23-10.200.8.26:22-10.200.16.10:40362 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:09.677000 audit[4483]: AVC avc: denied { watch } for pid=4483 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.2609799091/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c65,c922 tclass=file permissive=0 Dec 13 01:53:09.677000 audit[4483]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c002306640 a2=fc6 a3=0 items=0 ppid=3984 pid=4483 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c65,c922 key=(null) Dec 13 01:53:09.677000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:53:10.350000 audit[4521]: AVC avc: denied { watch } for pid=4521 comm="apiserver" path="/calico-apiserver-certs/..2024_12_13_01_49_49.37738128/tls.crt" dev="tmpfs" ino=3 scontext=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 tcontext=system_u:object_r:svirt_lxc_file_t:s0:c587,c877 tclass=file permissive=0 Dec 13 01:53:10.350000 audit[4521]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=7 a1=c000e30fa0 a2=fc6 a3=0 items=0 ppid=4134 pid=4521 auid=4294967295 uid=10001 gid=10001 euid=10001 suid=10001 fsuid=10001 egid=10001 sgid=10001 fsgid=10001 tty=(none) ses=4294967295 comm="apiserver" exe="/code/apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c587,c877 key=(null) Dec 13 01:53:10.350000 audit: PROCTITLE proctitle=2F636F64652F617069736572766572002D2D7365637572652D706F72743D35343433002D2D746C732D707269766174652D6B65792D66696C653D2F63616C69636F2D6170697365727665722D63657274732F746C732E6B6579002D2D746C732D636572742D66696C653D2F63616C69636F2D6170697365727665722D63657274 Dec 13 01:53:11.725000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.26:22-10.200.16.10:54216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:11.727223 systemd[1]: Started sshd@24-10.200.8.26:22-10.200.16.10:54216.service. Dec 13 01:53:11.736603 kernel: kauditd_printk_skb: 7 callbacks suppressed Dec 13 01:53:11.736718 kernel: audit: type=1130 audit(1734054791.725:1570): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.26:22-10.200.16.10:54216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:12.355000 audit[5575]: USER_ACCT pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.377036 kernel: audit: type=1101 audit(1734054792.355:1571): pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.377095 sshd[5575]: Accepted publickey for core from 10.200.16.10 port 54216 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:53:12.377625 sshd[5575]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:53:12.375000 audit[5575]: CRED_ACQ pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.383024 systemd[1]: Started session-27.scope. Dec 13 01:53:12.383959 systemd-logind[1399]: New session 27 of user core. Dec 13 01:53:12.405118 kernel: audit: type=1103 audit(1734054792.375:1572): pid=5575 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.405223 kernel: audit: type=1006 audit(1734054792.375:1573): pid=5575 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=27 res=1 Dec 13 01:53:12.405253 kernel: audit: type=1300 audit(1734054792.375:1573): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddad37cf0 a2=3 a3=0 items=0 ppid=1 pid=5575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:12.375000 audit[5575]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffddad37cf0 a2=3 a3=0 items=0 ppid=1 pid=5575 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=27 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:12.375000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:53:12.428611 kernel: audit: type=1327 audit(1734054792.375:1573): proctitle=737368643A20636F7265205B707269765D Dec 13 01:53:12.387000 audit[5575]: USER_START pid=5575 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.428929 kernel: audit: type=1105 audit(1734054792.387:1574): pid=5575 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.392000 audit[5577]: CRED_ACQ pid=5577 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.466780 kernel: audit: type=1103 audit(1734054792.392:1575): pid=5577 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.853550 sshd[5575]: pam_unix(sshd:session): session closed for user core Dec 13 01:53:12.853000 audit[5575]: USER_END pid=5575 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.860309 systemd[1]: sshd@24-10.200.8.26:22-10.200.16.10:54216.service: Deactivated successfully. Dec 13 01:53:12.861109 systemd[1]: session-27.scope: Deactivated successfully. Dec 13 01:53:12.862373 systemd-logind[1399]: Session 27 logged out. Waiting for processes to exit. Dec 13 01:53:12.863313 systemd-logind[1399]: Removed session 27. Dec 13 01:53:12.877244 kernel: audit: type=1106 audit(1734054792.853:1576): pid=5575 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.853000 audit[5575]: CRED_DISP pid=5575 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:12.858000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@24-10.200.8.26:22-10.200.16.10:54216 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:12.893080 kernel: audit: type=1104 audit(1734054792.853:1577): pid=5575 uid=0 auid=500 ses=27 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:17.957000 audit[1]: SERVICE_START pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.26:22-10.200.16.10:54230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:17.958059 systemd[1]: Started sshd@25-10.200.8.26:22-10.200.16.10:54230.service. Dec 13 01:53:17.967713 kernel: kauditd_printk_skb: 1 callbacks suppressed Dec 13 01:53:17.967827 kernel: audit: type=1130 audit(1734054797.957:1579): pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.26:22-10.200.16.10:54230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:18.583000 audit[5599]: USER_ACCT pid=5599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:18.603764 sshd[5599]: Accepted publickey for core from 10.200.16.10 port 54230 ssh2: RSA SHA256:t16aFHvQKfPoAwlQZqbEr00BgbjT/QwXGm40cf1AA4M Dec 13 01:53:18.604126 kernel: audit: type=1101 audit(1734054798.583:1580): pid=5599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:accounting grantors=pam_access,pam_unix,pam_faillock,pam_permit acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:18.604083 sshd[5599]: pam_unix(sshd:session): session opened for user core(uid=500) by (uid=0) Dec 13 01:53:18.602000 audit[5599]: CRED_ACQ pid=5599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:18.609104 systemd[1]: Started session-28.scope. Dec 13 01:53:18.610103 systemd-logind[1399]: New session 28 of user core. Dec 13 01:53:18.630934 kernel: audit: type=1103 audit(1734054798.602:1581): pid=5599 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:18.631027 kernel: audit: type=1006 audit(1734054798.602:1582): pid=5599 uid=0 subj=system_u:system_r:kernel_t:s0 old-auid=4294967295 auid=500 tty=(none) old-ses=4294967295 ses=28 res=1 Dec 13 01:53:18.631065 kernel: audit: type=1300 audit(1734054798.602:1582): arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdab8d8830 a2=3 a3=0 items=0 ppid=1 pid=5599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:18.602000 audit[5599]: SYSCALL arch=c000003e syscall=1 success=yes exit=3 a0=5 a1=7ffdab8d8830 a2=3 a3=0 items=0 ppid=1 pid=5599 auid=500 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=28 comm="sshd" exe="/usr/sbin/sshd" subj=system_u:system_r:kernel_t:s0 key=(null) Dec 13 01:53:18.602000 audit: PROCTITLE proctitle=737368643A20636F7265205B707269765D Dec 13 01:53:18.653842 kernel: audit: type=1327 audit(1734054798.602:1582): proctitle=737368643A20636F7265205B707269765D Dec 13 01:53:18.614000 audit[5599]: USER_START pid=5599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:18.616000 audit[5601]: CRED_ACQ pid=5601 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:18.673929 kernel: audit: type=1105 audit(1734054798.614:1583): pid=5599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_open grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:18.673987 kernel: audit: type=1103 audit(1734054798.616:1584): pid=5601 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:18.845000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:53:18.866553 kernel: audit: type=1400 audit(1734054798.845:1585): avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:53:18.866674 kernel: audit: type=1300 audit(1734054798.845:1585): arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00130a280 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:53:18.845000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c00130a280 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:53:18.845000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:53:18.849000 audit[2323]: AVC avc: denied { watch } for pid=2323 comm="kube-controller" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:53:18.849000 audit[2323]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=a a1=c001a708d0 a2=fc6 a3=0 items=0 ppid=2127 pid=2323 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-controller" exe="/usr/local/bin/kube-controller-manager" subj=system_u:system_r:svirt_lxc_net_t:s0:c464,c896 key=(null) Dec 13 01:53:18.849000 audit: PROCTITLE proctitle=6B7562652D636F6E74726F6C6C65722D6D616E61676572002D2D616C6C6F636174652D6E6F64652D63696472733D74727565002D2D61757468656E7469636174696F6E2D6B756265636F6E6669673D2F6574632F6B756265726E657465732F636F6E74726F6C6C65722D6D616E616765722E636F6E66002D2D617574686F7269 Dec 13 01:53:19.082557 sshd[5599]: pam_unix(sshd:session): session closed for user core Dec 13 01:53:19.083000 audit[5599]: USER_END pid=5599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:session_close grantors=pam_loginuid,pam_env,pam_lastlog,pam_limits,pam_env,pam_unix,pam_permit,pam_systemd,pam_mail acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:19.083000 audit[5599]: CRED_DISP pid=5599 uid=0 auid=500 ses=28 subj=system_u:system_r:kernel_t:s0 msg='op=PAM:setcred grantors=pam_env,pam_faillock,pam_unix acct="core" exe="/usr/sbin/sshd" hostname=10.200.16.10 addr=10.200.16.10 terminal=ssh res=success' Dec 13 01:53:19.085557 systemd[1]: sshd@25-10.200.8.26:22-10.200.16.10:54230.service: Deactivated successfully. Dec 13 01:53:19.084000 audit[1]: SERVICE_STOP pid=1 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 msg='unit=sshd@25-10.200.8.26:22-10.200.16.10:54230 comm="systemd" exe="/usr/lib/systemd/systemd" hostname=? addr=? terminal=? res=success' Dec 13 01:53:19.086729 systemd[1]: session-28.scope: Deactivated successfully. Dec 13 01:53:19.087516 systemd-logind[1399]: Session 28 logged out. Waiting for processes to exit. Dec 13 01:53:19.088336 systemd-logind[1399]: Removed session 28. Dec 13 01:53:19.471000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/apiserver.crt" dev="sda9" ino=7356 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:53:19.471000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00a7c9680 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:53:19.471000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:53:19.477000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:53:19.477000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00aab87b0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:53:19.477000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:53:19.486000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:53:19.486000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c007816f00 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:53:19.486000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:53:19.540000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-client.crt" dev="sda9" ino=7362 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:53:19.540000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c00a7c96b0 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:53:19.540000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:53:19.563000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/ca.crt" dev="sda9" ino=7354 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:53:19.563000 audit[2266]: AVC avc: denied { watch } for pid=2266 comm="kube-apiserver" path="/etc/kubernetes/pki/front-proxy-ca.crt" dev="sda9" ino=7360 scontext=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 tcontext=system_u:object_r:etc_t:s0 tclass=file permissive=0 Dec 13 01:53:19.563000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=75 a1=c0074db500 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:53:19.563000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:53:19.563000 audit[2266]: SYSCALL arch=c000003e syscall=254 success=no exit=-13 a0=76 a1=c00aab8930 a2=fc6 a3=0 items=0 ppid=2166 pid=2266 auid=4294967295 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=(none) ses=4294967295 comm="kube-apiserver" exe="/usr/local/bin/kube-apiserver" subj=system_u:system_r:svirt_lxc_net_t:s0:c344,c785 key=(null) Dec 13 01:53:19.563000 audit: PROCTITLE proctitle=6B7562652D617069736572766572002D2D6164766572746973652D616464726573733D31302E3230302E382E3236002D2D616C6C6F772D70726976696C656765643D74727565002D2D617574686F72697A6174696F6E2D6D6F64653D4E6F64652C52424143002D2D636C69656E742D63612D66696C653D2F6574632F6B756265 Dec 13 01:53:22.664388 systemd[1]: run-containerd-runc-k8s.io-2e321aba8ef0a2090aceeeebf57f66b51c81ea6d6504da57aeb3eaa9f4ec2525-runc.2Vq0ej.mount: Deactivated successfully.